How easy is it to hack a cellular network?
Cellular networks are not that hard to hack and it is almost impossible to protect it. Telcos probably are not ready to take responsibility and spend millions of dollars to secure their clients.
366 articles
Cellular networks are not that hard to hack and it is almost impossible to protect it. Telcos probably are not ready to take responsibility and spend millions of dollars to secure their clients.
Think a photo of your boarding pass is innocent when posted online? Think again.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
While FBI recommends victims to pay the ransom, Kaspersky Lab won back the access to the files for dozens of thousands of CoinVault and Bitcryptor victims.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
What is the difference between real and theoretical threats?
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We tend to think that protecting ourselves against future threats is most important. But, perhaps we need to take a step back and solve some of the major problems that we already know about.