Vulnerabilities in a toy robot permitting snooping. Seriously
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
31 articles
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Attackers are hijacking hotel accounts on Booking.com, and stealing their clients’ banking data through its internal messaging system.
Fibaro Smart Home Centers can be hacked, and the consequences for smart home owners are big.
The “another friend request from you” hoax on Facebook is gaining traction. Don’t fall for it.
On this episode of podcast, Jeff and David discuss a vulnerability in baby monitors, password reuse in Britain’s GenZ, and more.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
We have more bad news from the Yahoo hack: Even without a yahoo.com account, you may be at risk.
Security researchers claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed.
Researchers discovered a hack that affects 100 million Volkswagen cars. And the equipment needed costs just $40.
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
True tales of rigged lotteries, stolen millions, and the investigations that brought the thieves down.
Researchers expose details of 70,000 OKCupid accounts, without permission.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
Once considered a top 10 pick in the NFL Draft, Laremy Tunsil slides to Twitter hack, followed up with Instagram hack.
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
Spotify users’ account data once again found its way onto Pastebin. Change your password.
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.