News

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ The term APT was first used by U.S. Air Force back in 2006 to facilitate discussion about a set intrusion activities with specific characteristics. These days, APT is often used ...

by by Tony Chan

End of Support for IE 10 and Lower Versions
As announced by Microsoft, only the newest version of Internet Explorer (IE) will be supported from 12 January 2016. The older versions of IE will no longer be supported meaning that there will be no more security update for these browser versions thereafter, and any computer running them will ...

by Wilson Wong

Verify a Website before Providing your Username/Password
Phishing email spreads over the Internet from time to time. You may have received suspicious email telling you that your computer account has problems/will expire/has exceeded quota/etc. and requires you to verify your identity by clicking on a URL (Uniform Resource Locator) to a web page, and then ...

by Tony Chan

In the IT world, software applications have an associated life cycle - newer versions of applications with new or enhanced features are often released after a certain period of time to replace the older versions. As Microsoft Office 2013 had been released for more than three years, Microsoft ...

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ There is a massive upsurge of mobile devices in the consumer market. Corporations are also demanding their employees to have instant connectivity to their working environment ...

by Tony Chan

Windows 10 – the latest version of the Windows Operating System was launched in July 2015. It takes a huge leap forward and gives users a deep impression. It introduces plenty of new features and improves a number of existing features. Besides, the best news is the free upgrade of Windows 10 for ...

by Joe Lee

New and Relocation of Printing Facilities Two new Konica Minolta industrial grade fast printers have been installed to replace the old printers at the Run Run Shaw Creative Media Centre (CMC) to support the quota-controlled free printing service for students. A new colour printer is also made ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ To ensure that data centres meet the reliability and performance needs of universities, and achieve the comprehensive protection from various security threats, a number of aspects ...

by JUCC ISTF

Data Centre Management
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ Vulnerabilities of data centres are found in their physical security, systems / devices hosted and management procedures implemented. Several common exploitation techniques are ...

by Kevin Chan

Has Facebook, Twitter or Instagram already become an integral part of your life? You may want to share whatever you find interesting with your friends or followers, as frequent as you can. Wouldn’t it be a good idea if you can communicate with your colleagues on business issues the same way? What if ...