Skip to main content

Security Blog

Filter by:

Information Security Utopia Starts with Zero Trust Architecture

For a long time, as commonly perceived, stable and secure relationship between people and nations is built on the important cornerstone of “trust”. However, in recent years, those in the cyber security sector have suggested the contrary that only "Zero Trust" can...
Release Date: 7 Jun 2022 6549 Views

Please sign them. Smart contracts?

Smart contract is a program stored in the blockchain. Different from traditional contracts, it does not require third-party intervention. When the contract conditions are met, the program will automatically execute the contract and it cannot be changed In the past, there were...
Release Date: 4 Apr 2022 9106 Views

What You Know about the Cyber Security of NFT

Previously, we have introduced the non-fungible token (NFT) and how to protect crypto wallets. This time, we will discuss the ecosystem of NFT as well as various related parts that can be attacked or defrauded by criminals, and the corresponding security advice...
Release Date: 11 Mar 2022 11970 Views

NFT Boom, How to Protect Your NFT Assets

What is NFT?   NFT stands for Non-Fungible Token which is issued in according to the Ethereum ERC721 standard. Different from other cryptocurrencies, each NFT token has a unique ID, so it cannot be duplicated. Also, it can only be traded in its...
Release Date: 24 Jan 2022 13292 Views

Introduction of QR code attacks and countermeasures

QR code, first used by car manufacturers to trace parts, is now widely applied across different sectors. Not long along, we introduced some basic information and common applications of QR code, as well as their related security threats and advices. In this blog, ...
Release Date: 20 Jan 2022 12297 Views

Business as Usual under COVID-19 with Sound “Work from Home” Cyber Security

With the COVID-19 pandemic worsening again, many companies have arranged their staff to work from home (WFH) to reduce the risk of spreading the disease in the community. In light of this development, the Hong Kong Computer Emergency Response Team Coordination Centre (...
Release Date: 10 Jan 2022 6693 Views

Secure Use of QR Code

QR codes have become a part of our daily life. For example, in terms of consumption, three of the four electronic payment platforms that support the Consumption Voucher Scheme of the HKSAR Government offer QR code payment. Also, in terms of epidemic prevention, QR...
Release Date: 7 Jan 2022 6949 Views

Beware of Cyber Security Risks from Online Shopping and Long Holiday

With Christmas and New Year long holidays just around the corner, the strong festive atmosphere spells another peak season of shopping. Nowadays, as most of us have become accustomed to do our shopping online, we must always maintain good awareness of cyber security. To help...
Release Date: 21 Dec 2021 5515 Views

HKCERT Urges Local IT Users to Patch Apache “Log4j” Vulnerability ASAP

(Hong Kong, 16 December 2021) The Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) of the Hong Kong Productivity Council is urging local IT users to patch their systems as soon as possible in light of the discovery of a critical vulnerability in Apache...
Release Date: 16 Dec 2021 14721 Views

“Hong Kong Cyber Security New Generation Capture the Flag Challenge 2021” Award Presentation Ceremony Recognises Cyber Security Future Talents

The “Hong Kong Cyber Security New Generation Capture the Flag Challenge 2021”, jointly organised by the Hong Kong Productivity Council (HKPC) and its Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT), held its award presentation ceremony today to recognise the outstanding efforts of...
Release Date: 13 Dec 2021 11329 Views