13 articles
Recapping the 2017 iteration of Kaspersky Lab’s annual conference, the Security Analyst Summit, with 10 Tweets.
It turns out there are bots in Tinder and OkCupid. Who wants that?
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
The most sophisticated attack ever seen on any endpoint, this modular spyware lurks on Android and iOS.
Samsung releases more and more devices with Tizen OS. At SAS 2017, we found out that this OS is highly insecure.
Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.
We investigated three cases of ATM robbery — involving remote-controlled malware, a Bluetooth keyboard, and a drill.
After more than a year of investigation, our experts have a thorough understanding of the Lazarus campaign and advice for protection.
A possible connection between Moonlight Maze, an APT that targeted the Pentagon and NASA in the late 1990s, and Turla, a modern day threat actor.
This year’s SAS: no shortage of the world’s top cybersecurity experts who’ll be telling all sorts of scary stories about who’s been hacked, where, and how, and what needs to be done in response.
True cybersecurity experts must be skilled at reverse engineering. Prior to SAS, Nico Brulez will hold a corresponding training session.