Kaspersky Security Bulletin 2023. Statistics

Key statistics for 2023: ransomware, trojan bankers, miners and other financial malware, zero-day vulnerabilities and exploits, web attacks, threats for macOS and IoT. Continue reading Kaspersky Security Bulletin 2023. Statistics

IT threat evolution in Q3 2023. Non-mobile statistics

PC malware statistics for Q3 2023 include data on miners, ransomware, banking Trojans and other threats to Windows, macOS and IoT equipment. Continue reading IT threat evolution in Q3 2023. Non-mobile statistics

Matter 1.2 Smart Home Standard Adds Support for Fridges, Dishwashers, and More

Matter 1.2, the new version of the smart home standard adds support for 9 new device types including fridges, dish and laundry washers, robotic vacuums, and more.
The post Matter 1.2 Smart Home Standard Adds Support for Fridges, Dishwashers, and More a… Continue reading Matter 1.2 Smart Home Standard Adds Support for Fridges, Dishwashers, and More

Eyes everywhere: How to safely navigate the IoT video revolution

Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). Vacuum cleaners, bird feeders, connected cars and even smart ovens now come loaded… Continue reading Eyes everywhere: How to safely navigate the IoT video revolution

Overview of IoT threats in 2023

IoT threats: how devices get hacked, what malware is uploaded, and what services are on offer on the dark web in 2023. Continue reading Overview of IoT threats in 2023

IT threat evolution in Q2 2023. Non-mobile statistics

PC malware statistics for Q2 2022 includes data on miners, ransomware, banking Trojans, and other threats to Windows, macOS and IoT devices. Continue reading IT threat evolution in Q2 2023. Non-mobile statistics

Anticipating the next wave of IoT cybersecurity challenges

In this Help Net Security interview, Roland Atoui, Managing Director at Red Alert Labs, discusses the intricacies of transitioning from isolated IoT setups to interconnected environments, examining the broadening attack surface and the nuanced complexi… Continue reading Anticipating the next wave of IoT cybersecurity challenges