Skip to Content
Offensive AI: How you can optimize your Cybersecurity investment to prevent and detect attacks with AI technologies

Offensive AI: How you can optimize your Cybersecurity investment to prevent and detect attacks with AI technologies

After a few decades of rapid growth of Artificial Intelligence (AI) since 1950, AI has a greater and broader relevance to human lives...

Date : 31-March-2022
Organisation : Deloitte Advisory (Hong Kong) Limited
Writer : Ms. Eva KWOK, Mr. Terence LI and Ms. Vanessa MAK

Secure Use of QR Code

Secure Use of QR Code

In this blog, we would discuss the applications and risks in four major areas: mobile payment, website redirection, authentication and information storage...

Date : 18-January-2022
Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)

Protect sensitive information in the use of social media and beware of potential cyber attacks arising from data leakages

Protect sensitive information in the use of social media and beware of potential cyber attacks arising from data leakages

The security issue of placing personal information on social media platforms heightened once again after reports of serious data leakages at three of the world’s biggest operators in early April 2021...

Date : 18-January-2022
Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)

Common security issues of SMEs and non-profit making organisation websites

Common security issues of SMEs and non-profit making organisation websites
(Chinese Version Only)

與網站相關的攻擊近年不斷上升,黑客透過尋找網站系統的漏洞發動攻擊...

Date : 2-August-2021
Organisation : Cybersecurity Centre of the Hong Kong Institute of Vocational Education (IVE)
Writer : Mr. NG Kong Sum, Kinsey

Supply-chain attacks and protecting the “Chain of Trust”

Supply-chain attacks and protecting the “Chain of Trust”

Over the past decade, cyber security incidents which have caused devastating damages have largely been attributed to something called “supply-chain attacks”...

Date : 20-July-2021
Organisation : Thales Group
Writer : Mr. Welland Chu, Business Development Director, APAC and Mr. David Madden, Senior Business Development Director, Global

Mobile Payment Security Tips

Mobile Payment Security Tips

What can a consumer do to protect oneself when making mobile payment?...

Date : 3-June-2021
Organisation : Octopus Cards Limited
Writer : Mr Alan CHAN


Ransomware - Top Threat of 2020

Ransomware - Top Threat of 2020: How it has evolved and how one should prepare against its attack

Ransomware continues to cause havoc at organisations of all sizes including enterprises, financial institutions and healthcare that are handling sensitive data...

Date : 19-January-2021
Organisation : Thales Group
Writer : Mr. Welland Chu, Business Development Director and Mr. Rana Gupta, VP of Sales, APAC


Attacker is now able to bypass 2FA – how to prevent

Attacker is now able to bypass 2FA – how to prevent

2-Factor Authentication (2FA) has been rolled out in many organizations as their baseline security and is one of the items in top of mind in many CISO...

Date : 20-December-2019
Organisation : The Hong Kong Computer Society Cyber Security Specialist Group
Writer : Mr. Nelson YUEN, member of Executive Committee

Password Choices

Password Choices (Chinese Version Only)

每個人都有「不能說的密碼」,無論是網上銀行、購物還是社交媒體平台,現代人的生活與密碼不可分離...

Date : 29-March-2019
Organisation : Lapcom Limited
Writer : Mr. Eric KWOK, General Manager

Winning The Game Against Cyber Criminals

Winning The Game Against Cyber Criminals

Employees are fast becoming the weakest link in the defence against cybercriminals. Sometimes common sense can only go so far, as you need to make sure that best practices around security don’t go in one ear and out the other...

Date : 31-December-2018
Organisation : Asia Pacific at Palo Alto Networks
Writer : Sean Duca, Vice President and Chief Security Officer

Pay Attention to the Safety of IoT

Pay Attention to the Safety of IoT (Chinese Version Only)

物聯網裝置市場龐大,競爭也十分激烈。其裝置產品五花八門,廠商為了節省成本和縮短推出市面的時間,往往忽略了產品的網絡保安功能...

Date : 30-November-2018
Writer : Ms. Billie KWOK, Gold Winner of Cyber Security Professionals Awards 2017

Timely Patching

Timely Patching

Patch Management is nothing new for computer systems, but a challenge to execute effectively and efficiently. As more cyberattacks happen on endpoints, timely updates of security patches on computers are becoming even more crucial to protect systems...

Date : 16-November-2018
Writer : Mr. Laurence CHAN, Gold Winner of Cyber Security Professionals Awards 2017

Best Practices & Tips for Mobile Security

Best Practices & Tips for Mobile Security

In the global mobility and digital transformation landscape, under the MOBILE FIRST, MOBILE ONLY evolutions, it is no doubt that mobile would be the first selected by the end users experiencing the Internet application services...

Date : 24-September-2018
Writer : Mr. Chan Wai-hong, Gold Winner of Cyber Security Professionals Awards 2017

Multilayered Defense for Endpoint

Multilayered Defense for Endpoint

Organizations should look for an endpoint security solution that can defeat ransomware and other threats regardless of how they attack the endpoints...

Date : 25-July-2018
Writer : Mr. Victor Law, Gold Winner of Cyber Security Professionals Awards 2017

Tips on Protection against Phishing Scam

Tips on Protection against Phishing Scam

Phishing scams are actually attempts to trick you into a social networking and fraudulent email message, telephone SMS test message, and instant message from mobile apps...

Date : 1-June-2018
Writer : Mr. Frankie Leung, Gold Winner of Cyber Security Professionals Awards 2017

Safeguarding your Domain Name with Domain Name System Security Extensions (DNSSEC)

Safeguarding your Domain Name with Domain Name System Security Extensions (DNSSEC)

According to statistics disclosed by the Hong Kong Computer Emergency Response Team Coordination Centre, the number of security incident reports increased by over 23% to 6,058 reported cases in 2016 compared with 2015...

Date : 26-September-2017
Organisation : Hong Kong Internet Registration Corporation Limited (HKIRC)
Writer : Mr Leo Lam, Chief Executive Officer of HKIRC

Lessons Learnt from WannaCry (2): Integrated Automation of Cyber Security Measures to Mitigate the Threat of Industrialisation of Hacking

Lessons Learnt from WannaCry (2): Integrated Automation of Cyber Security Measures to Mitigate the Threat of Industrialisation of Hacking (Chinese Version Only)

WannaCry事件肆虐全球,令業界更關注網絡保安問題,亦說明黑客活動已變得工業化...

Date : 19-July-2017
Organisation : Cisco Systems, Inc.
Writer : Mr. Garrick Ng, Chief Technology Officer, Cisco Hong Kong, Macau and Taiwan

Lessons Learnt from WannaCry (1): Cyber Security is not Simply Employing Firewall?

Lessons Learnt from WannaCry (1): Cyber Security is not Simply Employing Firewall? (Chinese Version Only)

當商業及公共機構面對新型威脅,只是安裝新一代防火牆並不足夠應付;而是需要一個整合及自動化的網絡保安架構,配合完善的網絡保安情報系統,才能多層面地阻擋日益嚴峻的網絡攻擊...

Date : 19-July-2017
Organisation : Cisco Systems, Inc.
Writer : Mr. Garrick Ng, Chief Technology Officer, Cisco Hong Kong, Macau and Taiwan

Does the Green Padlock Shown in the Chrome Browser Means “Safe”?

Does the Green Padlock Shown in the Chrome Browser Means “Safe”?

Google大力推行HTTPS,不單止會係Chrome網址列側寫明HTTPS網站為「安全 Secure」,更會提高它們在搜尋結果中的排名—— 不過HTTPS又能否保證網站完全安全?其實又未必!

Date : 5-May-2017
Organisation : Hong Kong Information Technology Federation (HKITF)
Writer : Eric Fan

Moving more of the web to HTTPS

Moving More of the Web to HTTPS

HTTPS is an encrypted HTTP connection, making it more secure. If you own or run a website, implementing HTTPS is important to protect the integrity of your website and to preserve the privacy and security of your users…

Date : 3-March-2017
Organisation : Google Chrome
Writer : Parisa Tabriz

Precious Photos Encrypted by an Email?

Precious Photos Encrypted by an Email? (Chinese Version Only)

近日病毒界的熱門話題非加密勒索軟件(Ransomware)莫屬。它除了能無聲無息地加密個人電腦中的檔案,更可以順藤摸瓜潛入共用伺服器,加密封鎖整個公司,甚至公營機構的檔案…

Date : 20-April-2016
Organisation : Professional Information Security Association (PISA)
Writer : Eric Fan

The State of Cybersecurity: From Threats to Opportunities

The State of Cybersecurity: From Threats to Opportunities

Cyber crime is on the rise and organizations are beginning to realize that being attacked is not a matter of if, but when. According to the State of Cybersecurity: Implications for 2015 study…

Date : 15-January-2016
Organisation : ISACA China Hong Kong Chapter
Writer : ISACA China Hong Kong Chapter

8 Security Essentials for Managing Business Operations

8 Security Essentials for Managing Business Operations

According to the 2015 (ISC)2 Global Information Security Workforce Study, 62 percent of nearly 14,000 respondents believe that their organizations have too few information security professionals…

Date : 7-September-2015
Organisation : (ISC)2
Writer : Chuan-Wei Hoo

Security Issues of Hong Kong Home Routers

Security Issues of Hong Kong Home Routers

Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) analyzed home router security issues in Hong Kong using the Shodan Internet services search engine and found that a large number of home routers can be discovered by scanning…

Date : 30-July-2015
Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)

Safeguarding Your Domain Name

Safeguarding Your Domain Name

Rising cyber security threats have been posing challenges to not just corporation websites, but also their brands and trademarks. Visitors to the affected sites were redirected to fraudulent websites, which caused substantial loss in…

Date : 25-June-2015
Organisation : Hong Kong Internet Registration Corporation Limited (HKIRC)
Writer : Jonathan Shea

Tips on Securing Your Facebook Account

Tips on Securing Your Facebook Account

Nowadays, Facebook has become one of the core social networking platforms for people to connect with each other. To prevent hackers from accessing your Facebook to see your secrets…

Date : 17-April-2015
Organisation : Hong Kong Polytechnic University
Writer : IT Security Team, ITS Office

Email Security

Email Security (Chinese Version Only)

一名政界人士的電郵帳號月前被盜用,事件引起各界對於個人資料保護的關注。據事主表示,早前收到一封「朋友」發出的「緊急」電郵要求協助…

Date : 20-March-2015
Organisation : Hong Kong Information and System Security Professional Association (HKISSP)
Writer : Edwin Chan Hiu Chung

Timely Update Your Password and Operating System

Timely Update Your Password and Operating System (Chinese Version Only)

2014年9月,一個英國網站於互聯網發佈了上千數萬個網絡攝影機(IP Camera)的影像...

Date : 23-January-2015
Organisation : Professional Information Security Association (PISA)
Writer : Eric Fan

Beware when Configuring Wi-Fi

Beware when Configuring Wi-Fi (Chinese Version Only)

現在市面上很多Wi-Fi無線路由器均設有快速設定 (Quick Setup) 予公眾在家裡方便快捷地設定無線網路。但由於快速設定本身的不足…

Date : 23-January-2015
Organisation : Hong Kong Information and System Security Professional Association (HKISSP)
Writer : Jimmy Chow

Consequence of Identity Being Stolen

Consequence of Identity Being Stolen (Chinese Version Only)

新聞有報導的LINE帳戶被盜用,最近蔓延到身邊認識的人。近幾星期,不約而同的有朋友、學生、合作夥伴等...

Date : 30-December-2014
Organisation : Internet Society Hong Kong
Writer : Sang Young

Safety Tips for Children when Using the Internet

Safety Tips for Children when Using the Internet (Chinese Version Only)

根據(ISC)² 基金會在英國向千多名9至11歲的兒童調查發現, 24%的家長從來沒有過問他們在網上社交平台的活動 …

Date : 30-December-2014 
Organisation :  (ISC)² 
Writer : (ISC)² Safe and Secure Online

Cloud Security Standards for the Rest of Us

Cloud Security Standards for the Rest of Us

There are many Cloud Security standards in the world, but why they are matter to enterprises and small companies ? This article elaborates the standards in the market and the need of these...

Date : 30-December-2014
Organisation : Cloud Security Alliance
Writer : Michael Yung

 

Back to Top