![](http://www.trendmicro.com/vinfo/resources/images/tex/research-reports/wp-the-south-korean-fake-banking-app-scam_th.jpg)
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users.
![](http://www.trendmicro.com/vinfo/resources/images/tex/research-reports/wp-sextortion-in-the-far-east_th.jpg)
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
![](https://documents.trendmicro.com/images/TEx/articles/security-preparedness-survey.jpg)
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.