Skip to main content

Security Blog

Filter by:

Massive "911 S5" Botnet Affecting Nearly 19 Million IP Addresses Worldwide was Dismantled

"911 S5" botnet impacted nearly 19 million IP addresses globally, posing a significant threat to cybersecurity. In May 2024, the FBI, in collaboration with international law enforcement agencies, successfully dismantled the "911 S5" botnet [1]. Although the "911...
Release Date: 28 Oct 2024 4246 Views

IoT Security Guideline for Digital Signage

  Contents   Introduction Potential Threats Architecture of Digital Signage System Application Layer Management Layer Network Layer Device Layer Security Best Practice Application Layer Management Layer Network Layer Device Layer Conclusion and...
Release Date: 27 Sep 2024 4481 Views

Next-Level Phishing: The Evolving Threat Landscape

Phishing have become a common means of cybercrimes, but as technology advances, the methods used by criminals continue to evolve. As of the first half of 2024, HKCERT handled a total of 5,462 cybersecurity incidents, of which phishing accounted for 3,369...
Release Date: 21 Aug 2024 8443 Views

Ransomware's New Front: Uncovering the Latest Threats Facing Hong Kong

Ransomware remains a significant threat in the cybersecurity landscape, continuously evolving with new tactics and techniques. HKCERT explored the current attack vectors of ransomware incidents and the latest developments in ransomware and offered practical recommendations based on findings, focusing on the Asia-Pacific region, especially...
Last Update Date: 12 Aug 2024 Release Date: 9 Aug 2024 9420 Views

Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

In today's world, many shopping malls, coffee shops, and even public facilities offer complimentary charging stations as part of their enhanced customer services. These stations provide a convenient way for patrons to quickly recharge their mobile phones. However, users of such services...
Last Update Date: 24 Jul 2024 Release Date: 28 Feb 2020 10834 Views

CyberSecurity Tips for Travelling

It's summer vacation travel season again, and while everyone is relaxing and taking a break, hackers don't take vacations. The Hong Kong Computer Emergency Response Team (HKCERT) has prepared the following travel tips to help you protect your online security while...
Release Date: 11 Jul 2024 7644 Views

Weaponisation of AI: The New Frontier in Cybersecurity

The advent of artificial intelligence (AI) ushers in an era of unprecedented technological advancements, assisting various industries for further development. However, alongside these benefits, the misuse of artificial intelligence has also facilitated hackers and been "weaponised" by them to carry out cyber...
Release Date: 10 Jul 2024 8804 Views

Defacement Attacks: Understanding and Prevention

What is Defacement Attacks? Defacement attacks occur when malicious actors infiltrate a website online or a digital advertising panel device hardware, and replace its content with their own messages. These messages can range from political or religious statements to offensive language or embarrassing content. Here are...
Release Date: 20 Mar 2024 14126 Views

Deepfake: Where Images Don't Always Speak Truth

"Deepfake" is the combination of "Deep learning" and "Fake". It utilizes deep learning techniques to train on vast amounts of data, including facial images, voices, and videos. This data is used to mimic and learn the characteristics, movements, ...
Release Date: 11 Mar 2024 14482 Views

How To Protect Your Data in Quantum Age

A quantum computer represents a groundbreaking paradigm shift in computing, leveraging the intricate principles of quantum mechanics to execute certain computations exponentially faster than their classical counterparts. While classical computers rely on binary units known as classical bits, denoted as or 1, quantum computers operate on...
Release Date: 7 Mar 2024 11585 Views