Skip to main content

Security Blog

Filter by:

Verify from Various Sources to Ensure Security When Searching for Answers with AI

Recently, the artificial intelligence (AI) ChatBot, ChatGPT, has taken the Internet by storm. It is reported that the tool already has 100 million users. Most users say that compared with traditional search engines which only rely on input queries to provide websites of...
Release Date: 20 Feb 2023 5898 Views

How to Mitigate New Cyber Security Risks Arising from the Growing Use of Technology in Industrial Operations

In recent years, more enterprises and public utilities are leveraging 5G and Internet of Things (IoT) technologies to connect their industrial operation technology (OT) systems to the information technology (IT) systems or the Internet. This enables the operation data of factory machines...
Release Date: 6 Feb 2023 4857 Views

Upgrade Your End-of-Support Microsoft Products as Soon as Possible

If your refrigerator supplier stops providing maintenance services, will you “ignore it” and let the refrigerator’s fresh-keeping and refrigeration functions gradually disappear to become a hotbed for gems? Likewise, the security risks you face will only increase if you stick to...
Release Date: 19 Jan 2023 5812 Views

Analysing AgentTesla Spyware

According to Israeli cyber security solution provider Check Point’s “Global Threat Impact Index” monthly report published in early November[1], it was reported that AgentTesla continued to be one of the “Most Wanted Malwares”  in the world, affecting over 7% ...
Release Date: 29 Dec 2022 6483 Views

Beware of Phishing Campaigns During Festive Season

The easing of quarantine and social distancing restrictions has enabled the normalisation of economic activities and international travel.  Along with the upcoming Christmas and New Year long holidays, people will wish to travel abroad, consume gifts, and decorate for festive celebrations. Attracted by the discounts...
Release Date: 22 Dec 2022 3785 Views

Always Keep System Security Up-to-Date to Prevent Customer Data from Becoming Phishing Feeds

Local photo printing chain, Fotomax, fell victim to a ransomware attack and malicious encryption of its database in October last year, resulting in the leakage of over 600,000 customer data, including name, gender, date of birth, phone number, email address...
Release Date: 18 Nov 2022 5259 Views

Browser’s Anti-phishing feature: What is it and how it helps to block phishing attack?

Over the past four years, HKCERT has handled an average of about 8,900 local cyber security incidents per year, with phishing attacks accounting for 48% of all incidents in 2021 [1]. Even globally, phishing attacks account for 36% of total security...
Release Date: 15 Sep 2022 3586 Views

Adopt Good Cyber Security Practices to Make AI Your Friends not Foes

Artificial intelligence (AI) has experienced a rapid growth in its adoption by businesses in recent years. According to the International Data Corporation, companies around the world plan to increase their spending on AI solutions (e.g. hardware, software, services, etc...
Release Date: 30 Aug 2022 9719 Views

HKCERT Publishes Incident Response Guideline for SMEs to Enhance Information Security Incident Handling Competence

    (Hong Kong, 8 August 2022) Security incident reports received by the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) under the Hong Kong Productivity Council (HKPC) have remained...
Release Date: 8 Aug 2022 6924 Views

Email Account Theft to Bypass MFA Protection

Microsoft researchers recently discovered a large-scale phishing campaign that steals users' email accounts even they have multi-factor authentication (MFA) enabled. Research shows that this type of phishing attack has been active since September 2021 and has attempted to target at least 10...
Release Date: 2 Aug 2022 5974 Views