Vulnerabilities in a toy robot permitting snooping. Seriously
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
75 articles
Our experts found that a popular children’s toy robot contained vulnerabilities allowing malicious actors to make video calls to it, steal the parental account, and modify the firmware.
Online dating is great for those looking for love – but beware the risks!
Our colleagues conducted a study in which, among other things, they assessed how education in the field of information security relates to a career in that field.
Four major studies presented by our experts at the SAS 2023 international conference.
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Are you sure your former colleagues don’t have access to corporate data or systems?
Research seeks to understand key drivers of the future of work.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A CISO has to spend a lot of time interacting with the business and also needs a team of professionals who can perform highly specialized technical tasks.
What the Hoax verdict means, and why such software is becoming more of a problem.
Malware is often distributed in files disguised as episodes of popular TV series. We talk about the most dangerous TV series and how to spot the threat.
In this podcast, we sit down with Kaspersky Lab Global Research and Analysis Team member Ido Naor to discuss his upcoming talk at Black Hat.
A webinar on potential damage and the main risks associated with cloud breaches.
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
On this Kaspersky Lab podcast, Jeff talks with Sergey Golovanov about his SAS 2018 training on APT hunting.