SMS PVA Services’ Use of Infected Android Phones Reveals Flaws in SMS Verification

Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities. Read More HERE…

Read more

This Week in Security News – February 11, 2022

Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins Read More HERE…

Read more

This Week in Security News – January 28th, 2022

Welcome to our weekly roundup, where we share what you need to know about cybersecurity news and events that happened over the past few days. This week, read the third installment of Trend Micro’s Codex series. Also, read about the White House’s latest zero-trust approach to its cybersecurity strategy. Read More HERE…

Read more

TianySpy Malware Uses Smishing Disguised as Message From Telco

Trend Micro confirmed a new mobile malware infection chain targeting both Android and iPhone devices. The malware might have been designed to steal credentials associated with membership websites of major Japanese telecommunication services. Read More HERE…

Read more

This Week in Security News – January 7th, 2022

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…

Read more

This Week in Security News – January 7, 2022

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones. Read More HERE…

Read more

This Week in Security News – December 10, 2021

This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure. Read More HERE…

Read more

Private 5G Security Risks in Manufacturing Part 4

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. Read More HERE…

Read more

Does Home IoT Compromise Enterprise Security?

The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office. Read More HERE…

Read more

Security Risks with Private 5G Networks in Manufacturing Part. 3 Security Evangelist

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the “democratization of communications” entails its own risks that have not yet been made clear. To identify these risks, Trend Micro performed tests using an environment modeled after a steelworks with 5G equipment. In this third installment, we will describe the four penetration routes and three signal interception points identified in these tests, and we will discuss attack scenarios that exploit these weaknesses. Read More HERE…

Read more