Urban surveillance camera systems lacking security
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
“We are what we pretend to be, so we must be careful about what we pretend to be.” ― Kurt Vonnegut
170 articles
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
Windows 10 will offer users the ability to authenticate themselves with biometric identifiers rather than passwords
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
A researcher has developed a nasty boot kit capable of taking complete control of Mac OS X devices. Here is what you need to know.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.