Security Blog
IoT Security Guideline for Digital Signage
Contents
Introduction
Potential Threats
Architecture of Digital Signage System
Application Layer
Management Layer
Network Layer
Device Layer
Security Best Practice
Application Layer
Management Layer
Network Layer
Device Layer
Conclusion and...
Release Date: 27 Sep 2024
3057 Views
Next-Level Phishing: The Evolving Threat Landscape
Phishing have become a common means of cybercrimes, but as technology advances, the methods used by criminals continue to evolve. As of the first half of 2024, HKCERT handled a total of 5,462 cybersecurity incidents, of which phishing accounted for 3,369...
Release Date: 21 Aug 2024
7049 Views
Ransomware's New Front: Uncovering the Latest Threats Facing Hong Kong
Ransomware remains a significant threat in the cybersecurity landscape, continuously evolving with new tactics and techniques. HKCERT explored the current attack vectors of ransomware incidents and the latest developments in ransomware and offered practical recommendations based on findings, focusing on the Asia-Pacific region, especially...
Last Update Date: 12 Aug 2024 Release Date: 9 Aug 2024
7820 Views
Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations
In today's world, many shopping malls, coffee shops, and even public facilities offer complimentary charging stations as part of their enhanced customer services. These stations provide a convenient way for patrons to quickly recharge their mobile phones. However, users of such services...
Last Update Date: 24 Jul 2024 Release Date: 28 Feb 2020
9563 Views
CyberSecurity Tips for Travelling
It's summer vacation travel season again, and while everyone is relaxing and taking a break, hackers don't take vacations. The Hong Kong Computer Emergency Response Team (HKCERT) has prepared the following travel tips to help you protect your online security while...
Release Date: 11 Jul 2024
6348 Views
Weaponisation of AI: The New Frontier in Cybersecurity
The advent of artificial intelligence (AI) ushers in an era of unprecedented technological advancements, assisting various industries for further development. However, alongside these benefits, the misuse of artificial intelligence has also facilitated hackers and been "weaponised" by them to carry out cyber...
Release Date: 10 Jul 2024
7202 Views
Defacement Attacks: Understanding and Prevention
What is Defacement Attacks?
Defacement attacks occur when malicious actors infiltrate a website online or a digital advertising panel device hardware, and replace its content with their own messages. These messages can range from political or religious statements to offensive language or embarrassing content.
Here are...
Release Date: 20 Mar 2024
12211 Views
Deepfake: Where Images Don't Always Speak Truth
"Deepfake" is the combination of "Deep learning" and "Fake". It utilizes deep learning techniques to train on vast amounts of data, including facial images, voices, and videos. This data is used to mimic and learn the characteristics, movements, ...
Release Date: 11 Mar 2024
12359 Views
How To Protect Your Data in Quantum Age
A quantum computer represents a groundbreaking paradigm shift in computing, leveraging the intricate principles of quantum mechanics to execute certain computations exponentially faster than their classical counterparts.
While classical computers rely on binary units known as classical bits, denoted as or 1, quantum computers operate on...
Release Date: 7 Mar 2024
10225 Views
Taking Security Best Practice During Festive Season
Heading to the year's end means that most people would plan their long holidays to gather with families and friends, buy new goods, or travel abroad. Online services have become more and more popular. We should stay vigilant on cyber security risks during the...
Release Date: 8 Dec 2023
12395 Views