Skip to main content

Security Blog

Filter by:

Defacement Attacks: Understanding and Prevention

What is Defacement Attacks? Defacement attacks occur when malicious actors infiltrate a website online or a digital advertising panel device hardware, and replace its content with their own messages. These messages can range from political or religious statements to offensive language or embarrassing content. Here are...
Release Date: 20 Mar 2024 5353 Views

Deepfake: Where Images Don't Always Speak Truth

"Deepfake" is the combination of "Deep learning" and "Fake". It utilizes deep learning techniques to train on vast amounts of data, including facial images, voices, and videos. This data is used to mimic and learn the characteristics, movements, ...
Release Date: 11 Mar 2024 5536 Views

How To Protect Your Data in Quantum Age

A quantum computer represents a groundbreaking paradigm shift in computing, leveraging the intricate principles of quantum mechanics to execute certain computations exponentially faster than their classical counterparts. While classical computers rely on binary units known as classical bits, denoted as or 1, quantum computers operate on...
Release Date: 7 Mar 2024 5336 Views

Taking Security Best Practice During Festive Season

Heading to the year's end means that most people would plan their long holidays to gather with families and friends, buy new goods, or travel abroad. Online services have become more and more popular. We should stay vigilant on cyber security risks during the...
Release Date: 8 Dec 2023 8133 Views

Raise Public Awareness of Cyber Security: Guard against Risks of Unknown WhatsApp Video Calls

With the advancement of technology, cyber security has become an important issue that cannot be ignored in our lives. Cyber-attacks have become increasingly sophisticated. Some citizens have reported to the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) that they have received...
Release Date: 7 Nov 2023 9495 Views

Protecting Critical Infrastructures: IT/OT Convergence vs MITM Attacks

As more industrial systems connect to the Internet, there is an increasing prevalence of the convergence of information technology (IT) and operational technology (OT). While the benefits of this convergence are numerous and include increased productivity and efficiency, it also brings new cyber security...
Release Date: 2 Nov 2023 8096 Views

Ransomware Trends Q2 2023: Surge in Attacks Across Asia-Pacific, Persistent Multiple Extortion, and Evolving Threat Landscape

The evolution of ransomware has significantly affected businesses in recent years. Current trends indicate that ransomware developers are increasingly inclined to employ multiple extortion strategies. Furthermore, they have expanded their focus to platforms that previously received less scrutiny, such as the macOS operating system. Employing...
Release Date: 22 Sep 2023 10312 Views

HKCERT Alerts the Public on Preventive Measures Against WhatsApp Account Theft

Recently, there has been a surge in cyber attack targeting WhatsApp accounts. Hackers are sending messages to victims, impersonating their friends and family, and requesting that the victims forward the registration codes of their WhatsApp accounts. The fraudsters exploit these registration codes to gain access...
Release Date: 6 Sep 2023 8892 Views

Comprehensive Guide to Social Media Scams: Setting up Defense to Safeguard Your Personal Information

Social media has become a necessary part of people's daily lives, but it has also attracted the attention of unscrupulous individuals. The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) reminds the public to be cautious of social media scams and to always...
Release Date: 18 Aug 2023 7314 Views

Introducing the New HKCERT “All-Out Anti-Phishing” Thematic Page

Noticing that hackers are deploying phishing through various means, including email, social media and SMS, phishing attacks have become an increasingly threatening major cyber security threat in Hong Kong. Such phishing scams have posed a great impact to our society that individual victims could suffer from...
Release Date: 16 Aug 2023 7301 Views