Should we protect embedded Linux devices?
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
3157 articles
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
Discussing privacy in Threads, and whether you should sign up to Zuckerberg’s Twitter clone.
July Microsoft Patch Tuesday: a collection of exploited vulnerabilities.
Audio deepfakes that can mimic anyone’s voice are already being used for multi-million dollar scams. How are deepfakes made and can you protect yourself from falling victim?
A few dozen malicious extensions — with a combined 87 million downloads — discovered in Google’s Chrome Web Store.
Low-code apps lower IT costs, but boost information security risks. How to mitigate them?
Malicious versions of the free-to-download game Super Mario 3: Mario Forever plant a miner and a stealer on gamers’ machines.
Researchers have come up with a way to exfiltrate confidential data by observing LED activity.
APT operators are showing increasing interest in mobile devices. Our experts have studied one of their tools.
What web skimmers are, why you should keep a look out for them when shopping online, and how to protect yourself.
Crypto Olympics, or the full gamut of blockchain attacks: the biggest, most sophisticated, most audacious cryptocurrency heists of all time.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
What two-factor authentication types are out there, and which ones should be preferred.
Which screen-locking method best protects your Android smartphone: PIN code, password, pattern lock, fingerprint, or face recognition?