This Week in Security News – January 7, 2022

Credit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.

Read more

This Week in Security News – January 7th, 2022

Credit to Author: Jon Clay| Date: Fri, 07 Jan 2022 00:00:00 +0000

This week, read about Log4j vulnerabilities in connected cars and charging stations and how iOS malware can fake iPhone shutdowns to snoop on cameras and microphones.

Read more

This Week in Security News – December 10, 2021

Credit to Author: Jon Clay| Date: Fri, 10 Dec 2021 00:00:00 +0000

This week, read about Trend Micro’s predictions for security in the coming year. Also, learn about the Biden administration’s latest initiatives for curtailing attacks on the transport infrastructure.

Read more

Private 5G Security Risks in Manufacturing Part 3

Credit to Author: Yohei Ishihara| Date: Fri, 29 Oct 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Private 5G Security Risks in Manufacturing Part 2

Credit to Author: Yohei Ishihara| Date: Fri, 15 Oct 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Private 5G Security Risks in Manufacturing Part 4

Credit to Author: Yohei Ishihara| Date: Fri, 12 Nov 2021 00:00:00 +0000

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry.

Read more

Does Home IoT Compromise Enterprise Security?

Credit to Author: William Malik| Date: Tue, 02 Nov 2021 00:00:00 +0000

The most recent Pwn2Own (Fall 2021 Pwn2Own Austin) includes more IoT entries than ever. This gives us an opportunity to probe today’s largest and newest enterprise attack surface: the home office.

Read more

Security Risks with Private 5G Networks in Manufacturing Part. 3

Credit to Author: Yohei Ishihara| Date: Fri, 29 Oct 2021 00:00:00 GMT

We can see signs of increased activity in areas of business that use 5G around the world. 5G technology will usher in new personal services through smartphones, and it will also play a large part in industry. The option of Private 5G lets private companies and local governments have their own telecom infrastructures. However, the “democratization of communications” entails its own risks that have not yet been made clear. To identify these risks, Trend Micro performed tests using an environment modeled after a steelworks with 5G equipment. In this third installment, we will describe the four penetration routes and three signal interception points identified in these tests, and we will discuss attack scenarios that exploit these weaknesses.

Read more