Hidden dangers of biometric authentication devices
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
18 articles
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
Kaspersky ICS-CERT experts have discovered several critical vulnerabilities in Telit Cinterion M2M modems, which are used in millions of devices.
The specifics of protecting and updating the OT infrastructure.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
What cyberimmunity means in practice and in the industrial infrastructure environment.
Remote Administration Tools in ICS environment are an additional risk factor, and not necessarily a justified one.
Targeted attacks are dangerous, but that doesn’t mean you should forget about threats that are more common.
Effective protection of industrial facilities requires permanent monitoring of both information systems and operational processes. We have just the tool.
We conducted a global survey of 359 industrial cybersecurity practitioners to learn more about perceptions and realities.
We at Kaspersky Lab consider the Adaptive Security Architecture the most efficient model to build up cybersecurity practices for industrial objects
To protect critical infrastructure, industrial facilities need a way to share information.
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
Up close and personal, one Kaspersky Labs editor’s experience with the system failure at Delta Air Lines.
How concerned should we be with industrial security?
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
In March I spoke at Cyber Intelligence Asia 2014, where CERTs from most Asians countries were presented. The fact is that only a few CERTs are now dealing in some