A robot’s ransom
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
32 articles
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
We’re hosting an online workshop at the European Information Security Summit 2018 to help businesses get their networks prepared for new and emerging threats.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here’s how it works.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
Catching criminals, waking up a sleepy driver, stopping teens from buying cigarettes — facial recognition can help us accomplish all that and more.
Accurate identification of people’s faces is a very human process but computers are gaining on our processing. A look at what’s going on now and what we’ll see soon.
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it appears?
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
The tech which seemed something from science fiction yesterday, are entering our everyday lives. One of such gizmos is direct neural interfaces.