Knowlegde

Most employees reusing personal passwords to protect corporate data

0 comments Uncategorized

A research conducted by My1Login surveyed 1,000 employees and 1,000 business leaders, found that 85% of employees are reusing passwords across business…

Read More

Patch Vulnerabilities in Remote Access and Remote Storage Now

0 comments Uncategorized

The COVID-19 pandemic has seen a surge in the adoption of remote access solutions such as virtual private networks (VPNs), remote storage…

Read More

Email fatigue among users opens doors for cybercriminals

0 comments

Under COVID-19 pandemic, business is moved to remote work. More business data is being shared by email. Sifting the email large amount of…

Read More

Ransomware Keep Evolving: Multiple Extortion

0 comments

Ransomware attacks are currently causing extensive havoc worldwide, becoming one of the biggest cyber threats nowadays. More and more companies and organisations…

Read More

Watch out: These unsubscribe emails only lead to further spam

0 comments

Researcher found that scammers user fake ‘unsubscribe’ spam emails, ask the receivers if they want to subscribe or unsubscribe their email, to…

Read More

Email spoofing: how attackers impersonate legitimate senders

0 comments Uncategorized

Spoofing email is an ordinary way of hackers to attack their target. This social engineering skills is usually based on some breached information….

Read More

QSnatch Malware Prevention and Cleanup 

0 comments Uncategorized

In this highly-digitalized era, many SMEs and personal computer users are leveraging on the easy-to-manage and low-cost nature of Network-attached Storage (NAS) devices to…

Read More

FBI Warns of Ongoing Zoom-Bombing Attacks on Video Meetings

0 comments

FBI warns that some of the organization zoom meeting session has been disrupted, since hackers try to join their meeting and pulling…

Read More

Hack me if you can episode 3【Learn these tips to protect against phishing and malware】

0 comments Uncategorized

Let’s check out how to identify phishing email and what are the 7 key security tips to protect yourself against phishing and…

Read More

Hack me if you can episode 4【Beware of IoT security to enjoy a safety smart living】

0 comments

If you do not adopt proper cyber security measures, such devices may create opportunity for hackers. In this episode, hacker “Ah Keung”…

Read More
1 2

ESSENTIAL