Attacks on wireless chargers: how to “fry” a smartphone
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
24 articles
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
We review a major cryptocurrency theft using spyware inside a PDF.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Epidemics, espionage, destruction: We present the most memorable cyberattacks of recent years.
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
Did our 2016 predictions come true? Let’s see and try to forecast what awaits the security industry in 2017.
The first zero-day exploit for InPage text processor had been used in attacks on Asian banks.
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Kaspersky Lab has patented technology enabling our software to detect man-in-the-middle (MitM) attacks, beloved of authors of financial malware.
It now appears the number of servers bought and sold via xDedic might have been underestimated; it’s likely many more IPs have been compromised by xDedic players.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Konstantin Goncharov recaps the most significant security events of 2015.