Main navigation
News
by Colin Yeung

In recent months, a disturbing trend has emerged across Taiwan, Hong Kong, and Macao with blackmail email threats targeting prominent public sector figures. These threats began in November 2024 and have since expanded to other regions, signaling a significant security concern. Understanding ...
by Joe Lee

CityUHK has taken a step towards providing a password-less login for all its users as part of its ongoing digital transformation journey. Since November 2024, CityUHK users who have registered for an iAM Smart account can link it to their CityUHK accounts, allowing them to enjoy this convenient ...
by Colin Yeung (OCIO)

Phishing Attacks and Deepfake Technique: A Growing Concern In today's digital landscape, cyber threats continue to evolve, and it is crucial to stay vigilant and informed about the latest techniques used by cybercriminals. Two significant concerns in the realm of cybersecurity are phishing attacks ...
by Colin Yeung (OCIO)

What is ransomware? [1] [2] Ransomware is a form of malicious software (malware) designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. By encrypting these files and demanding a ransom payment for the decryption key, cybercriminals place individuals ...
by Deep Batra

Anti-virus software is vital to help keep both University computers and your own personal computer secure. With this in mind, the Computing Services Centre (CSC) has performed rigorous due-diligence work to ensure the right product is chosen to address the upcoming challenges users face in the ...
by Joe Chow

Many departments organize public meetings and webinars (online seminar) using Zoom but they are not aware of any security measures for preventing intruders from disturbing their events. Like face-to-face seminars, it is possible to have guests (mostly uninvited guests) who may interrupt the meetings ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Authentication is the process of identifying the authenticity of a user. It can be accomplished by means of a combination of login ID (identification) and password (authentication ...
by Cyril Ha

Background Information System Security has been a key concern over the past many years as more and more business processes rely on Information Technology to operate. Alike many other organizations, the usual first line of defense would be Internet protection with security devices such as a ...
by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ More and more transactions are performed online. Thus, a secured connection has to be ensured between the server and the client. However, connection mainly requires just a server ...