News

by John Chan

You may be aware of the heightened alerts for computer security measures from recent press reports. Hackers are using all sorts of sophisticated means in order to illegally gain access to computer systems, to capture electronic ID and passwords, to steal electronic data, and/or launch denial of ...

by Peter Mok

Background The sophistication of IT crime increases as technology advances. Widespread of scams are rampaged through the popular use of the Internet and email. Among all IT crimes, they are dominated by phishing and identity theft activities [1]. Phishing is a high-tech scam that uses spam email or ...

by Raymond Poon

What is two-factor authentication? It means users, in addition to their password, need one of the following to log in a system or to access a network service: One form of tokens provided by the service provider (e.g., a key fob or a smart card) The output of one form of biometric scans on finger or ...

by Joe Lee

Desktop Security Management
Connecting to today's turbulent computing environment is not risk free. How can users survive from unknown virus infection, phishing attacks, software vulnerabilities and zero-day exploit? We have used McAfee's anti-virus software for some years and the ePolicy Orchestrator (ePO) since 2002 for ...

by Noel Laam

In the light of the surging hacking attacks, security protection has become the top priority in all data centres worldwide. With our repeated plea for help and cooperation, some of our users apparently still cannot understand the importance of a good password practice. It is believed that the ...

by Noel Laam

Security incidents such as virus infection or hacking of machines in the Student Residence (SR) have been a recurrent and serious problem faced by the Computing Services Centre (CSC) since the inception of the SR. Causes leading to the current situation are many, some of them are: Lack of security ...

by Alex Lam

Since many easy-to-use and powerful Internet applications are now readily available, more and more people in CityU are making use of the Internet for their daily studies, researches and electronic communication of all forms. In addition, with an increasing number of students living in hostels, the ...

by Clevin Wong

Unsafe attachments of e-mails may threaten the security or integrity of the recipient's computer when they are opened. For example, opening an e-mail attachment with extension such as ".exe", ".vbs" or ".scr" causes it to be executed as a program. Executing a malicious program may unleash harmful ...

by Raymond Poon

The Sasser virus and its variants have been rampaging on the Internet since May 2004. According to the information provided by Symantec, Sasser is an Internet worm spreading through the MS04-011 (LSASS) vulnerability. This vulnerability is caused by a buffer overrun in the Local Security Authority ...

by Clevin Wong

Spam, or junk mail, refers to unsolicited commercial e-mail (UCE) and unsolicited bulk e-mail (UBE). Example includes unsolicited advertisements. Spam spreads everywhere on the Internet nowadays and create problems to most of the e-mail users. Although e-mail companies and standards bodies are ...