Skip to main content

Security Blog

Filter by:

Introducing “Check Your Cyber Security Readiness” Online Self-Assessment Tools

The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) had previously complied  the “Seven Habits of Cyber Security for SMEs” guideline to improve cyber defence of SMEs through seven cyber security aspects. The guideline came with a simple self-assessment checklist for...
Release Date: 7 Sep 2021 7744 Views

Patch Vulnerabilities in Remote Access and Remote Storage Now

The COVID-19 pandemic has seen a surge in the adoption of remote access solutions such as virtual private networks (VPNs), remote storage and cloud-based technologies in remote office scenarios. However, these solutions have also exposed a new attack surface to the Internet...
Release Date: 1 Sep 2021 8384 Views

Beware of Malicious or Vulnerable Third Party Dependencies

Rapid growth in third-party dependencies (including open-source libraries, packages and container images, etc.) has significantly changed the modern software development process. Most applications nowadays are built on a combination of in-house and external code. Public open-source...
Release Date: 4 Aug 2021 4943 Views

Ransomware Keep Evolving: Multiple Extortion

Ransomware attacks are currently causing extensive havoc worldwide, becoming one of the biggest cyber threats nowadays. More and more companies and organisations have been materially affected. According to a ransomware report, the average ransomware payment in 2021 Q1 was US$ 220,298, (HK...
Release Date: 22 Jun 2021 4963 Views

Beware of Flash Phishing Attacks

In the first quarter of this year, HKCERT has processed over 300 phishing attack incidents per month on average, up about 30% from same period last year. Apart from the increase in cases, HKCERT has also noticed that hackers have been using new techniques, ...
Release Date: 7 Jun 2021 4969 Views

Protect sensitive information in the use of social media and beware of potential cyber attacks arising from data leakages

The security issue of placing personal information on social media platforms heightened once again after reports of serious data leakages at three of the world’s biggest operators in early April this year:   Data of 533 million Facebook users were exposed publicly [1]; Data of 500...
Release Date: 27 Apr 2021 6744 Views

Beware of Unauthorised Deactivation of WhatsApp Account

Recently an overseas security researcher has demonstrated how to exploit a flaw in the SMS verification and account deactivation process of WhatsApp to deactivate a person’s WhatsApp account [1] without his or her knowledge. Even two-step verification could not prevent the move. ...
Release Date: 19 Apr 2021 3060 Views

QSnatch Malware Prevention and Cleanup

In this highly-digitalized era, many SMEs and personal computer users are leveraging on the easy-to-manage and low-cost nature of Network-attached Storage (NAS) devices to help them store information and multimedia files. This makes the devices an...
Release Date: 26 Mar 2021 4403 Views

Party’s over for Emotet, One of the World’s Most Feared Botnets

Emotet, one of the most notorious botnets of the past decade, has been taken down in a joint operation by Europol and Eurojust in January 2021 [1]. A cyber security researcher also confirmed that a new module has been sent to the infected devices via Emotet...
Release Date: 11 Feb 2021 3469 Views

End-of-Support for Adobe Flash Player after 31 December 2020

Adobe had announced that Flash Player will no longer be supported after 31 December 2020, meaning the end of this life-long web content tool. Adobe has also stated that the Flash content will be blocked from running in Flash Player beginning from 12 January 2021, ...
Release Date: 16 Dec 2020 8574 Views