
What kind of security do embedded systems need?
Features of embedded systems and suitable protection methods for them.
959 articles
Features of embedded systems and suitable protection methods for them.
Can Linux-based embedded systems be considered secure by default or do they require additional protection?
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Attacks on companies via their suppliers and contractors are becoming increasingly widespread. How can you manage this risk?
Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.
Hidden logic, data poisoning, and other targeted attack methods via AI systems.
Episode 365 has chatbots, CAPTCHA, Trump and yet more GDPR woes!
Episode 364 has Tamagotchi’s, is TOR broken and crazy robot shenanigans!
This phishing campaign incorporates ghost spoofing, embedded text in images, a PDF file, a QR code, DocuSign imitation, and Cloudflare verification — yet it still completely misses the mark.
Episode 363 has brain rot, stolen mobiles in China and streaming fraud!
Why and how to create a local backup of cloud data, taking Notion as an example.
Episode 360 looks at fake Taylor Swift, Nvidia woes, TV ads and much more!
Episode 358 has a North Korean hacker accidently getting hired by an American Cybersecurity firm, deepfake bullying woes for children, Grok is reading your tweets, and a data breach impacting 4.3 million people.
Episode 357 has Telegram zero-day vulnerability, more CrowdStrike woes, Disney hacktivism and Elon’s Humanoid robots are coming for us all
Episode 356 has K-Pop, AI, Bob Dylan and the AT&T ‘mega breach!’
Episode 354 has more DMA news, Microsoft in the docks, Google thwart influencer op & more!
Episode 353 of the Kaspersky podcast has ransomware, Apple in the docks and music copyright mayhem!
Episode 352 of the Kaspersky podcast has GitHub, social media warning labels and ransomware payouts!
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.