Doug Olenick reports:
While cartoon crime fighter Kim Possible may be the last character, real or unreal, to regularly use a pager/beeper, Trend Micro is still finding these somewhat old-fashion communication devices that are still in use leak wide variety of private information potentially opening up the users for a conventional cyberattack.
The fact is pagers are still used in a variety of industries and thus need to be on any CISO’s radar. The third installment (first report and second report) in Trend Micro’s “Leaking Beeps” series show how IT systems that work with unencrypted pagers can be accessed and the data recovered used by malicious actors for a wide variety of purposes.
Read more on SC Magazine.