ICS and IoT – A Special Podcast Series (Ep. 1)
In this special edition of the Kaspersky Transatlantic Cable Podcast, we dive into the world of critical infrastructure with the Kaspersky ICS team.
182 articles
In this special edition of the Kaspersky Transatlantic Cable Podcast, we dive into the world of critical infrastructure with the Kaspersky ICS team.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
The day I turned home network defender and stopped making fun of IoT developers.
A vivid example of why we need to strengthen IoT security — and a solution to the problem.
ENISA has published recommendations for information security for IoT devices deployed within critical infrastructure facilities
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
Who is responsible when connected devices go on a crime spree?
Manufacturers need to change their mindset when it comes to the IoT
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Why international standards are important, and how Kaspersky contributes to IoT standardization.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
How to protect the less obvious parts of your IT infrastructure (and from what) — from printers and video surveillance kit to insulin pumps.
A new vulnerability allows remote attackers to gain root privileges on Linux servers. How easy is it for CVE-2024-6387 to be exploited – and how to prevent it
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.