Skip to main content

Security Blog

Filter by:

Next-Level Phishing: The Evolving Threat Landscape

Phishing have become a common means of cybercrimes, but as technology advances, the methods used by criminals continue to evolve. As of the first half of 2024, HKCERT handled a total of 5,462 cybersecurity incidents, of which phishing accounted for 3,369...
Release Date: 21 Aug 2024 6470 Views

Ransomware's New Front: Uncovering the Latest Threats Facing Hong Kong

Ransomware remains a significant threat in the cybersecurity landscape, continuously evolving with new tactics and techniques. HKCERT explored the current attack vectors of ransomware incidents and the latest developments in ransomware and offered practical recommendations based on findings, focusing on the Asia-Pacific region, especially...
Last Update Date: 12 Aug 2024 Release Date: 9 Aug 2024 7191 Views

Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

In today's world, many shopping malls, coffee shops, and even public facilities offer complimentary charging stations as part of their enhanced customer services. These stations provide a convenient way for patrons to quickly recharge their mobile phones. However, users of such services...
Last Update Date: 24 Jul 2024 Release Date: 28 Feb 2020 9047 Views

CyberSecurity Tips for Travelling

It's summer vacation travel season again, and while everyone is relaxing and taking a break, hackers don't take vacations. The Hong Kong Computer Emergency Response Team (HKCERT) has prepared the following travel tips to help you protect your online security while...
Release Date: 11 Jul 2024 5816 Views

Weaponisation of AI: The New Frontier in Cybersecurity

The advent of artificial intelligence (AI) ushers in an era of unprecedented technological advancements, assisting various industries for further development. However, alongside these benefits, the misuse of artificial intelligence has also facilitated hackers and been "weaponised" by them to carry out cyber...
Release Date: 10 Jul 2024 6552 Views

Defacement Attacks: Understanding and Prevention

What is Defacement Attacks? Defacement attacks occur when malicious actors infiltrate a website online or a digital advertising panel device hardware, and replace its content with their own messages. These messages can range from political or religious statements to offensive language or embarrassing content. Here are...
Release Date: 20 Mar 2024 11466 Views

Deepfake: Where Images Don't Always Speak Truth

"Deepfake" is the combination of "Deep learning" and "Fake". It utilizes deep learning techniques to train on vast amounts of data, including facial images, voices, and videos. This data is used to mimic and learn the characteristics, movements, ...
Release Date: 11 Mar 2024 11311 Views

How To Protect Your Data in Quantum Age

A quantum computer represents a groundbreaking paradigm shift in computing, leveraging the intricate principles of quantum mechanics to execute certain computations exponentially faster than their classical counterparts. While classical computers rely on binary units known as classical bits, denoted as or 1, quantum computers operate on...
Release Date: 7 Mar 2024 9690 Views

Taking Security Best Practice During Festive Season

Heading to the year's end means that most people would plan their long holidays to gather with families and friends, buy new goods, or travel abroad. Online services have become more and more popular. We should stay vigilant on cyber security risks during the...
Release Date: 8 Dec 2023 11877 Views

Raise Public Awareness of Cyber Security: Guard against Risks of Unknown WhatsApp Video Calls

With the advancement of technology, cyber security has become an important issue that cannot be ignored in our lives. Cyber-attacks have become increasingly sophisticated. Some citizens have reported to the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) that they have received...
Release Date: 7 Nov 2023 14083 Views