Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users. Read more
Over several months, our researchers monitored the Chinese mobile cybercriminal underground to see what kind of wares cybercriminals were trading. What they found was a diverse set of offerings created to suit different purposes. Read more
Nearly 40 of the top 50 free apps in Google Play now have fake counterparts available for download on both official and third-party app stores. These fake apps should not be taken lightly since cyberciminals are now using them in their schemes. Read more
NBC News teamed up with Trend Micro for a honeypot experiment designed to check the security of consumer-grade gadgets in time for the 2014 Sochi Winter Olympics. The results show the need for tougher mobile security. Read more