Search Result: 7
Build a Secure Cyberspace 2023 - “Protect Your Online Security in Web 3.0” Seminar
With the development of internet and its evolvement into the third generation, the complexity of cyber attack increases at the same time. How could we protect ourselves online? Join the “Protect Your Online Security in Web 3.0” seminar co-organised by the Hong Kong Computer Emergency Response Coordination Centre (HKCERT), the Office of the Government Chief Information Officer (OGCIO) and the Hong Kong Police Force (HKPF), and learn from information security experts how to strengthen your security in the world of Web 3.0. Language: Cantonese Charge: Free (Registration is required) Target audience: SME staff, IT professionals and the general public
Visit cyberhub.hk for free training to avoid being the victim of cyber risks!
Visit cyberhub.hk for free training to avoid being the victim of cyber risks!Want to avoid being the next victim of cyber risks? Train up your staff to mitigate potential risks from the source.The changes in the digital era, such as digital transformation, work-from-home and e-commerce, bring not only convenience but also potential cyber risks. According to data from Hong Kong Police Force Cyber Security and Technology Crime Bureau (CSTCB), corporate email scams have caused losses of more than HKD 1.5 billion in 2021.Lack of cybersecurity training will lead to employees relying on their own experience to work without any awareness of cyber risks and hence exposing the company to cybersecurity risks!Cybersec Training Hub Cybersec Training Hub is a complimentary self-learning platform initiated by Hong Kong Internet Registration Corporation Limited (HKIRC), which aims to lower the threshold for organisations to provide cybersecurity training to employees, particularly for SMEs with limited resources. The vision of HKIRC is to join hands with the community to build Hong Kong into a healthier and safer cyber-smart city by enhancing cybersecurity awareness among different industries and employees as well as reducing cybersecurity risks from the source.How to Start- Bookmark the website of Cybersec Training Hub (cyberhub.hk)- Schedule the training for your employees flexibly. Induction training for new joiners is highly recommended.- Employees will receive an e-certificate after completing the 20-minute online self-training- Send the e-certificate to HR/managers as a training record Benefits of the Programme- Professional training content provided by well-known Big-4 cybersecurity consultancy firms- User-friendly, interactive, and ready-to-use- Available in Traditional Chinese and English- Introduce cyber risks in a real-life working scenario- Training targeting different job positions (e.g. HR, Finance, etc.)- Complimentary and easy to use for all SMEsVisit cyberhub.hk to start your free training NOW!For enquiry, please email to HKIRC Cybersecurity Team: firstname.lastname@example.org
Scammers look for targets on various social platforms. After getting to know the victims’ interests, scammers easily win the victims’ affection and start an online romantic relationship. Then, scammers use a plethora of reasons to ask for money. Scammers and victims never meet in real life.Also, scammers induce the victims to participate in investment on fake investment platforms after a romantic relationship is established. Initially, victims would make small profits, but after putting in more money the victims would end up suffering huge losses. The fraud is also known as the “Pig-butchering Scam”. [How Traditional Romance Scam Works] ProfessionalsScammers usually claim to be professionals, such as engineers or management officers in international corporations who come from Western countries but currently working in South East Asia. They communicate with the victims in English and ask them for money using different reasons.Excuses, excusesScammers falsely claim that they need to pay a large medical bill or need cash urgently;Scammers falsely claim that they have sent victims precious “gifts” from overseas which are held in customs and ask victims to pay the clearance fees/handling fee.Never met in real lifeVictims have never seen the scammers (be it in person or through video call). After scammers receive money, they delete their social media accounts, phone numbers or email addresses, cutting off contact with the victims completely. [How “Pig-butchering Scam” Works] Pig SeekingScammers pretend to be wealthy millennials and look for targets on social platforms or dating apps and keep chasing them to establish romantic relationships shortly.Pig FeedingScammers induce victims to invest in securities, foreign exchange or virtual assets on fake investment platforms or by using fake mobile apps. In the beginning, scammers would let victims make small profits.Pig ButcheringWhen the victims make profits and request to cash out, the fake platform administrator will make up reasons to delay processing the request and lure the victims to make an even greater investment which causes the victims to suffer a huge loss. (The video is in Cantonese) Anti-fraud advice- Use the search engine to search for photos shown on the other party’s social accounts- Check whether the friend circle of the other party’s account is abnormal- If you have doubts about the identity of the other party, try to talk to the other party via video calls- Do not download apps from unknown sources- Beware of investment plans with unrealistic returns- If in any doubt, call the fraud prevention hotline 18222 (Source：Website of Cyber Defender)
To meet the pace and needs for development, the Observatory also recruits Information Technology (IT) contract staff to develop software and applications related to scientific research and services. Here above the analyst programmers shared on their work and personal experience at the Observatory. Organisation chartOfficial recruitment page
How to dispose of old mobile phone safely?
You may have received a new mobile phone as a present. After excitingly transferring data to your new mobile, have you ever considered the following?Can 'Reset to factory settings' completely clear data in your phone?Using 'Low-level formatting' to erase data?Can a second-hand shop recover your deleted data? Any difference between clearing data on phones and computers?To avoid deleted data from being captured from a computer hard disk, people usually use low-level formatting, overwriting, degaussing and physical destruction. Regarding smartphones with a solid-state drive (SSD), clearing data by overwriting or degaussing may not be applicable or effective. There are low-level format tools designed for mobile phone hard disks, but they are rather difficult to use. How to delete all data on a mobile phone safely and with ease? Apple iOS UserRecommendations on the Apple official website:1. Sign out of iCloud, iTunes and App Store.2. If you are switching to a non-Apple phone, deregister iMessage.3. Tap “General” -> “Transfer or Reset [device]” > “Erase All Content and Settings”Android UserThe Android official website recommends resetting your phone to factory settings to remove all data from your phone.Is it that simple?Actually, newer iOS and Android models have the mobile phone storage area encrypted upon manufacturing to enhance data security. In other words, even if you take out the hard disk, you cannot directly read data on the phone without the encryption key. Therefore, even if low-level formatting is not performed, it does not necessarily mean deleted data can be recovered easily.DO remember to back up your phoneHowever, before resetting to factory settings or erasing content from your phone, remember to back up and ensure your phone has been encrypted to protect your data. (Source: Website of Cyber Defender)
Security risks of using free public Wi-Fi
Free Wi-Fi is provided in public places such as government public facilities, shopping malls, hotels or restaurants for the public and customers to access the Internet. However, there are hidden cyber security risks when using public Wi-Fi.Security RisksWhen your mobile device is connected to a fake Wi-Fi hotspot created by hackers or one that is intruded by hackers, hackers can intercept messages and steal your personal data, account information and password, etc. They may also install malware in your devices. Most routers and smartphones allow users to set whatever service set identifiers (SSID) they want, so it is difficult to distinguish official Wi-Fi hotspots with naked eyes.Which is the official free Wi-Fi? Hackers can fake any SSID (Wi-Fi hotspot name), so it is not easy to determine which Wi-Fi hotspot is really safe to use. Tips to keep you safe on free Wi-Fi- Verify the SSID with the Wi-Fi service providers- Do not connect to unencrypted Wi-Fi hotspots- Do not transmit sensitive information or use online banking services over a public network- Install firewall, anti-virus and anti-malware in mobile devices- Keep the system and applications in mobile devices up-to-date- Remove the Wi-Fi access point after use and turn off auto-connect to Wi-Fi networks or hotspots (The video is in Cantonese) (Source：Website of Cyber Defender)
12 tricks of online romance scammers
The police have recently cracked down on an online romance fraud syndicate and seized a “12-step online dating guide” believed to be circulated within the group to showcase how to spot and ensnare potential victims. Let's take a look at the 12 tricks of online romance scammers listed below. Fraudsters are known to play different mind games and if you are not careful enough, you can easily become the next victim. To protect yourself against scams, always be vigilant and alert to news relating to scams. If you suspect that you have become a victim, call the Police’s Anti-Deception Coordination Centre hotline 18222 for help. (Information source: Investor and Financial Education Council)