Skip to main content

Security Guideline

Filter by:

Ransomware Decryption Guideline

If computer or smart device were infected with ransomware, please do not pay the ransom. Users can search for the decryption tool in the following webpage: https://www.nomoreransom.org/en/decryption-tools.html   Most ransomware variants do not...
27 Sep 2018 3069 Views

Seven Habits of Cyber Security for SMEs

Background: The WannaCry ransomware swept the world in May 2017. Many local SMEs were frightened. Those which became victims were threatened to pay ransom to get back their data.   With the popularisation of smart technology, more and more business transactions are conducted over the network...
11 Sep 2018 3737 Views

How to configure your Windows PC to use the secure DNS service? (For home users only)

Table of Contents: Window 7 Window 10   Many security incidents are used to lure user to access the malicious site via a phishing URL or malware background execution. To avoid and protect your personal computer, you could configure your DNS service as follow:   Prerequisite...
10 Jul 2018 3757 Views

The Ten Most Critical Web Application Security Risks (OWASP Top 10) – 2017

The Ten Most Critical Web Application Security Risks   OWASP (Open Web Application Security Project) community helps organizations develop secure applications. They come up with standards, freeware tools and conferences that help organizations as well as researches. OWASP top 10 is the list of top...
15 Jun 2018 6423 Views

Understanding and Tackling Supply Chain Attack

Table of Contents: BackgroundWhat is Supply Chain Attack?Forms of Supply Chain AttacksNew challenges to the supply chain in digital transformationTackling Supply Chain AttacksReferences   Background   HKCERT named the Supply Chain Attack as one of the five Potential Cyber Security Trends in January 2018 in our annual...
12 Apr 2018 4945 Views

Help: How to handle email scam

The following information is about how to handle email scam.   A common trick is the email sender claims to be bank, online auction or shopping sites, or webmail service providers, and requests you to provide login credentials such as user name and password by visiting a...
6 Apr 2018 3432 Views

Help: How to handle ransomware infection

The following information is about preventing and handling ransomware infection.   Cyber criminals make use of ransomware to encrypt computer files, and demand for ransom from the victim for decrypting the files. But even if the victim pays, there is no guarantee that the files can be...
6 Apr 2018 2789 Views

Help: How to handle security incidents related to mobile devices

The following information is about how to handle security incidents related to mobile devices such as smart phones, tablets. If you encounter security incidents related to mobile devices: You should scan the device with the latest version of security tool. If any malware is found through...
6 Apr 2018 2702 Views

Help: How to handle theft or suspension of online services accounts

The following information is about how to handle theft or suspension of online services accounts such as email, social network.   If online service accounts are stolen, the data and address book might be stolen. The account might also be used to deliver scam messages to your...
6 Apr 2018 2506 Views

Help: How to remove malware and obtain information of security tools selection

The following information is about how to remove malware, and obtain information of security tools selection.   Most malware pretend to be legitimate software or document to trick user to open them, for example, free software or games, software crackers, Office documents or PDF documents...
6 Apr 2018 1709 Views