Reminder: Update Sentinel drivers
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately
190 articles
Researchers at our ICS CERT discovered a number of vulnerabilities in the Sentinel solution, so users are advised to update the drivers immediately
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
In this week’s edition of Kaspersky Lab’s podcast, Jeff and Dave discuss Alexa ads and helping police, Intel’s “meltdown,” and more.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
We conducted a global survey of 359 industrial cybersecurity practitioners to learn more about perceptions and realities.
The outbreak of Trojan ransomware WannaCry has already caused a heap of trouble to all kinds of businesses. However, we expect that companies whose infrastructures employ embedded systems are feeling particularly unhappy
The unprecedented outbreak of Trojan ransomware WannaCry has created a worldwide plague affecting home users and businesses. We have already posted some basics about WannaCry, and in this post we will
As we keep saying, it’s very important to be aware of the latest cybersecurity news and threats. Being prepared is more than half the battle. However, even those who know
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time
What were you doing when you were 10-years old? Chances are it was not as profitable as this youngster from Finland. Earlier this week, it was announced that a boy
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
Usually we say “black box” when we speak about flight data recorders, but these devices are implemented on ships as well. They are called Voyage Data Recorders, or VDRs. Maritime
There’s a lot to be said about passwords. First, every year new generations discover the Internet and keep making the same mistakes as their predecessors, who in turn do not
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
Malware development and our attempts to fight it sometimes remind us of a deep TV series: one can trace how “characters” acquire new skills, overcome hardships and make new achievements.
There is no decent alternative to passwords, especially when it comes to protecting your email, personal finances and devices that store your personal data. That’s why it’s crucial to use
It was last year when a new method of attack on cellular networks was discovered. It requires neither costly radio scanners nor PC powerhouses and is available to virtually anyone.
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
While communication technology providers are seeking consensus over the future of 5G networks, carriers are wasting no time in rolling out new technologies available for the current 4G networks. Voice