{"id":14349,"date":"2019-01-18T08:00:07","date_gmt":"2019-01-18T16:00:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/18\/news-8101\/"},"modified":"2019-01-18T08:00:07","modified_gmt":"2019-01-18T16:00:07","slug":"news-8101","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/18\/news-8101\/","title":{"rendered":"This Week in Security News: Risky Radio Remotes and Cybercrime"},"content":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s new research on radio frequency technology and the risks of radio remote controllers<em>. <\/em>Also, understand why there is a rise in physical crime in the cybercrime underground.<\/p>\n<p>Read on:<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/01\/15\/exclusive-watch-hackers-take-control-of-giant-construction-cranes\/#7bd89dec1d0a\"><strong>Exclusive: Hackers Take Control Of Giant Construction Cranes<\/strong><\/a><\/p>\n<p><em>Trend Micro Research discovered that the lack of implemented security in radio frequency technology could lead to production sabotage, system control, and unauthorized access to industrial machines.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-magecart-attack-delivered-through-compromised-advertising-supply-chain\/\"><strong>New Magecart Attack Delivered Through Compromised Advertising Supply Chain<\/strong><\/a><\/p>\n<p><em>Trend Micro found a malicious skimming code loaded on e-commerce websites providing ticketing, touring, and flight booking services as well as self-hosted shopping cart websites.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/techcrunch.com\/2019\/01\/14\/tesla-is-entering-the-model-3-into-pwn2own-one-of-the-worlds-toughest-hacking-contests\/\"><strong>Tesla is Entering the Model 3 Into Pwn2Own, One of the World\u2019s Toughest Hacking Contests<\/strong><\/a><\/p>\n<p><em>Trend Micro is partnering with Tesla to include a Model 3 sedan in Pwn2Own Vancouver this year, the first time a car has been included in the annual high-profile hacking contest.<\/em><\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics\/\"><strong>Google Play Apps Drop Anubis Banking Malware, Use Motion-based Evasion Tactics<\/strong><\/a><\/p>\n<p><em>Trend Micro found two malicious apps, that were disguised as useful tools, on Google Play that drop wide-reaching banking malware.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/government-shutdown-cybersecurity-impact\/\"><strong>As the Government Shutdown Drags On, Security Risks Intensify<\/strong><\/a><\/p>\n<p><em>Cybersecurity risks grow during the US government shutdown as organizations within the Department of Homeland Security\u2014including the new Cybersecurity and Infrastructure Security Agency \u2014are operating with skeleton crews.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/attacks-against-industrial-machines-via-vulnerable-radio-remote-controllers-security-analysis-and-recommendations\"><strong>Attacks Against Industrial Machines via Vulnerable Radio Remote Controllers: Security Analysis and Recommendations<\/strong><\/a><\/p>\n<p><em>Radio frequency technology is being used to control various industrial machines. However, the lack of implemented security could lead to production sabotage, system control, and unauthorized access.<\/em><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/hackers-breach-and-steal-data-from-south-koreas-defense-ministry\/\"><strong>Hackers Breach and Steal Data from South Korea&#8217;s Defense Ministry<\/strong><\/a><\/p>\n<p><em>Hackers have breached 30 computers in the South Korean government agency that oversees weapons and munitions acquisitions, stealing documents from at least ten of those computers.<\/em><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-rise-of-physical-crime-in-the-cybercrime-underground\"><strong>The Rise of Physical Crime in the Cybercrime Underground<\/strong><\/a><\/p>\n<p><em>While underground forums have long been the purview of digital crimes, recent developments have shown signs of increasing synergy and interaction between traditional criminals and cybercrime actors.<\/em><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/firms-fined-1m-for-singhealth-data-security-breach\/\"><strong>Firms fined $1M for SingHealth Data Security Breach<\/strong><\/a><\/p>\n<p><em>SingHealth and Singapore&#8217;s public healthcare sector IT agency IHIS have been slapped with S$250,000 and S$750,000 financial penalties, respectively, for the July 2018 cybersecurity attack that breached the country&#8217;s personal data protection act.<\/em><\/p>\n<p>Are you surprised that there is rise in threat actors who delve in both traditional crime and cybercrime? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: <a href=\"https:\/\/twitter.com\/jonlclay\">@JonLClay.<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-risky-radio-remotes-and-cybercrime\/\">This Week in Security News: Risky Radio Remotes and Cybercrime<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-risky-radio-remotes-and-cybercrime\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 18 Jan 2019 15:18:00 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-300x300.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-768x768.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-1024x1024.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-640x640.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-900x900.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-440x440.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/02\/Week-in-Security-News-Logo_RGB-380x380.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about Trend Micro\u2019s new research on radio frequency technology and the risks of radio remote controllers. Also, understand why there is a rise in physical crime&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/this-week-in-security-news-risky-radio-remotes-and-cybercrime\/\">This Week in Security News: Risky Radio Remotes and Cybercrime<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,4503,10416,714,20719],"class_list":["post-14349","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-cybercrime","tag-pwn2own","tag-security","tag-singhealth"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14349"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14349\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}