Are you over 18 and want to see adult content?
More Annotations
A complete backup of https://collabora.com
Are you over 18 and want to see adult content?
A complete backup of https://dural.de
Are you over 18 and want to see adult content?
A complete backup of https://fitinline.com
Are you over 18 and want to see adult content?
A complete backup of https://smeet.com
Are you over 18 and want to see adult content?
A complete backup of https://cachlamdepmoingay.com
Are you over 18 and want to see adult content?
A complete backup of https://planetablue.net
Are you over 18 and want to see adult content?
A complete backup of https://georgeharrison.com
Are you over 18 and want to see adult content?
A complete backup of https://jerseykui.com
Are you over 18 and want to see adult content?
A complete backup of https://opentuition.com
Are you over 18 and want to see adult content?
A complete backup of https://anybunny.mobi
Are you over 18 and want to see adult content?
A complete backup of https://lfetransport.co.uk
Are you over 18 and want to see adult content?
A complete backup of https://myweather2.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of thepilatesstudio.net
Are you over 18 and want to see adult content?
A complete backup of ninaatigoons.com
Are you over 18 and want to see adult content?
A complete backup of landcareaustralia.org.au
Are you over 18 and want to see adult content?
A complete backup of adrianflux.co.uk
Are you over 18 and want to see adult content?
A complete backup of whostalkinseo.com
Are you over 18 and want to see adult content?
A complete backup of drsearswellnessinstitute.org
Are you over 18 and want to see adult content?
Text
REPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21TRANSLATE THIS PAGE 比賽分為⼩學組、中學組及公開組三個組別,活動登記⽇期為2020年11⽉22⽇⾄2020年12⽉20⽇。. 比賽共分兩個階段進⾏: 第⼀階段為 網上問答挑戰賽 (由2021年1⽉4⽇⾄2021年1⽉31⽇舉⾏)。. 第⼆階段為 網「樂」安全挑戰賽 (於2021年4⽉10⽇舉⾏),只限於⼩學及 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
NETGEAR PRODUCTS MULTIPLE VULNERABILITIES Netgear Products Multiple Vulnerabilities. Multiple vulnerabilities were identified in Netgear Products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security IBM WEBSPHERE APPLICATION SERVER MULTIPLE VULNERABILITIES IBM WebSphere Application Server Multiple Vulnerabilities. Multiple vulnerabilities have been identified in IBM WebSphere Application Server, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and sensitive information disclosure on the targeted system. BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. BEST PRACTICE GUIDE (SSL IMPLEMENTATION) FOR MOBILE APP Page 5 certificate, and verification of implementation into the tender or quotation specification of the mobile app development project. For broader consideration on personal data privacy during the design anddevelopment of
如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21TRANSLATE THIS PAGE 比賽分為⼩學組、中學組及公開組三個組別,活動登記⽇期為2020年11⽉22⽇⾄2020年12⽉20⽇。. 比賽共分兩個階段進⾏: 第⼀階段為 網上問答挑戰賽 (由2021年1⽉4⽇⾄2021年1⽉31⽇舉⾏)。. 第⼆階段為 網「樂」安全挑戰賽 (於2021年4⽉10⽇舉⾏),只限於⼩學及 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
NETGEAR PRODUCTS MULTIPLE VULNERABILITIES Netgear Products Multiple Vulnerabilities. Multiple vulnerabilities were identified in Netgear Products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security IBM WEBSPHERE APPLICATION SERVER MULTIPLE VULNERABILITIES IBM WebSphere Application Server Multiple Vulnerabilities. Multiple vulnerabilities have been identified in IBM WebSphere Application Server, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and sensitive information disclosure on the targeted system. BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. BEST PRACTICE GUIDE (SSL IMPLEMENTATION) FOR MOBILE APP Page 5 certificate, and verification of implementation into the tender or quotation specification of the mobile app development project. For broader consideration on personal data privacy during the design anddevelopment of
如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. GOOGLE CHROME MULTIPLE VULNERABILITIES Google Chrome Multiple Vulnerabilities. Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service and remote code execution on the targeted system. CVE-2021-21193 is being exploited inthe wild.
IBM WEBSPHERE APPLICATION SERVER MULTIPLE VULNERABILITIES IBM WebSphere Application Server Multiple Vulnerabilities. Multiple vulnerabilities have been identified in IBM WebSphere Application Server, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and sensitive information disclosure on the targeted system. GOOGLE CHROME MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ADOBE READER AND ACROBAT MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. OPERA BROWSER REMOTE CODE EXECUTION AND SPOOFING HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. SUN JAVA JDK / JRE MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. REALNETWORKS HELIX SERVER MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. VMWARE VMA AND ESX PRODUCTS KRB5 MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ADOBE ACROBAT/READER AND FLASH PLAYER CODE EXECUTION HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL Beware of "Are you available?" phishing scam email. Release Date: 25 Feb 2020 4884 Views. HKCERT has recently noticed that some students from local universities have received a phishing scam email with the subject "Are you available?". The scammer impersonated as a professor or university executive, seeking urgent help and reply from the email MICROSOFT EDGE MULTIPLE VULNERABILITIES Microsoft Edge Multiple Vulnerabilities. Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. CVE-2021-21224 is being exploited in the wild. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. ISC BIND MULTIPLE VULNERABILITIES ISC BIND Multiple Vulnerabilities. Release Date: 29 Apr 2021 2245 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. APACHE TOMCAT DENIAL OF SERVICE VULNERABILITY Apache Tomcat Denial of Service Vulnerability. Last Update Date: 29 Jun 2020 08:55 Release Date: 29 Jun 2020 2258 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Web Servers. A vulnerability was identified in Apache Tomcat, a remote attacker could exploit this vulnerability to trigger denial of service on the targeted system. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY Splunk Enterprise Information Disclosure Vulnerability. Last Update Date: 20 Jun 2018 10:02 Release Date: 20 Jun 2018 1741 Views. RISK: Medium Risk. Medium Risk. TYPE: Security software and application - Security Software & Appliance. Multiple vulnerabilities have been identified in Splunk Enterprise. A remote user can exploit this VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITY vsftpd Compromised Source Packages Backdoor Vulnerability. A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's mainserver.
HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL Beware of "Are you available?" phishing scam email. Release Date: 25 Feb 2020 4884 Views. HKCERT has recently noticed that some students from local universities have received a phishing scam email with the subject "Are you available?". The scammer impersonated as a professor or university executive, seeking urgent help and reply from the email MICROSOFT EDGE MULTIPLE VULNERABILITIES Microsoft Edge Multiple Vulnerabilities. Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. CVE-2021-21224 is being exploited in the wild. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. ISC BIND MULTIPLE VULNERABILITIES ISC BIND Multiple Vulnerabilities. Release Date: 29 Apr 2021 2245 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. APACHE TOMCAT DENIAL OF SERVICE VULNERABILITY Apache Tomcat Denial of Service Vulnerability. Last Update Date: 29 Jun 2020 08:55 Release Date: 29 Jun 2020 2258 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Web Servers. A vulnerability was identified in Apache Tomcat, a remote attacker could exploit this vulnerability to trigger denial of service on the targeted system. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY Splunk Enterprise Information Disclosure Vulnerability. Last Update Date: 20 Jun 2018 10:02 Release Date: 20 Jun 2018 1741 Views. RISK: Medium Risk. Medium Risk. TYPE: Security software and application - Security Software & Appliance. Multiple vulnerabilities have been identified in Splunk Enterprise. A remote user can exploit this VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITY vsftpd Compromised Source Packages Backdoor Vulnerability. A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's mainserver.
MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. GOOGLE CHROME MULTIPLE VULNERABILITIES Google Chrome Multiple Vulnerabilities. Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service and remote code execution on the targeted system. CVE-2021-21193 is being exploited inthe wild.
SAP PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in SAP Products, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, cross-site scripting and security restriction bypass on the targete ADOBE MONTHLY SECURITY UPDATE (JUN 2021) Adobe has released monthly security update for their products ANDROID MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. GOOGLE CHROME MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, data manipulation and sensitive information disclosure on the targeted SUN JAVA JDK / JRE MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ADOBE ACROBAT/READER AND FLASH PLAYER CODE EXECUTION HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. MIT KERBEROS KDC "PROCESS_TGS_REQ()" DOUBLE FREE HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BUILDING A CYBER SECURITY AND CLOUD PROTECTION FRAMEWORK Cyber security has become a crucial enabler for any successful digital transformation process. Nevertheless, many organisations are still struggling to establish a effective cyber security protection model to protect their critical and sensitive assets. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL Beware of "Are you available?" phishing scam email. Release Date: 25 Feb 2020 4884 Views. HKCERT has recently noticed that some students from local universities have received a phishing scam email with the subject "Are you available?". The scammer impersonated as a professor or university executive, seeking urgent help and reply from the email MICROSOFT EDGE MULTIPLE VULNERABILITIES Microsoft Edge Multiple Vulnerabilities. Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. CVE-2021-21224 is being exploited in the wild. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. ISC BIND MULTIPLE VULNERABILITIES ISC BIND Multiple Vulnerabilities. Release Date: 29 Apr 2021 2245 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. APACHE TOMCAT DENIAL OF SERVICE VULNERABILITY Apache Tomcat Denial of Service Vulnerability. Last Update Date: 29 Jun 2020 08:55 Release Date: 29 Jun 2020 2258 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Web Servers. A vulnerability was identified in Apache Tomcat, a remote attacker could exploit this vulnerability to trigger denial of service on the targeted system. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY Splunk Enterprise Information Disclosure Vulnerability. Last Update Date: 20 Jun 2018 10:02 Release Date: 20 Jun 2018 1741 Views. RISK: Medium Risk. Medium Risk. TYPE: Security software and application - Security Software & Appliance. Multiple vulnerabilities have been identified in Splunk Enterprise. A remote user can exploit this VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITY vsftpd Compromised Source Packages Backdoor Vulnerability. A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's mainserver.
HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL Beware of "Are you available?" phishing scam email. Release Date: 25 Feb 2020 4884 Views. HKCERT has recently noticed that some students from local universities have received a phishing scam email with the subject "Are you available?". The scammer impersonated as a professor or university executive, seeking urgent help and reply from the email MICROSOFT EDGE MULTIPLE VULNERABILITIES Microsoft Edge Multiple Vulnerabilities. Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. CVE-2021-21224 is being exploited in the wild. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. ISC BIND MULTIPLE VULNERABILITIES ISC BIND Multiple Vulnerabilities. Release Date: 29 Apr 2021 2245 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system. APACHE TOMCAT DENIAL OF SERVICE VULNERABILITY Apache Tomcat Denial of Service Vulnerability. Last Update Date: 29 Jun 2020 08:55 Release Date: 29 Jun 2020 2258 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Web Servers. A vulnerability was identified in Apache Tomcat, a remote attacker could exploit this vulnerability to trigger denial of service on the targeted system. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, security restriction bypass and cross-site scripting attack on the targetedsystem.
OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY Splunk Enterprise Information Disclosure Vulnerability. Last Update Date: 20 Jun 2018 10:02 Release Date: 20 Jun 2018 1741 Views. RISK: Medium Risk. Medium Risk. TYPE: Security software and application - Security Software & Appliance. Multiple vulnerabilities have been identified in Splunk Enterprise. A remote user can exploit this VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITY vsftpd Compromised Source Packages Backdoor Vulnerability. A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's mainserver.
MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. GOOGLE CHROME MULTIPLE VULNERABILITIES Google Chrome Multiple Vulnerabilities. Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service and remote code execution on the targeted system. CVE-2021-21193 is being exploited inthe wild.
SAP PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in SAP Products, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, cross-site scripting and security restriction bypass on the targete ADOBE MONTHLY SECURITY UPDATE (JUN 2021) Adobe has released monthly security update for their products ANDROID MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. GOOGLE CHROME MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, data manipulation and sensitive information disclosure on the targeted SUN JAVA JDK / JRE MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ADOBE FLASH PLAYER AND AIR MULTIPLE CODE EXECUTION HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ADOBE ACROBAT/READER AND FLASH PLAYER CODE EXECUTION HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BUILDING A CYBER SECURITY AND CLOUD PROTECTION FRAMEWORK Cyber security has become a crucial enabler for any successful digital transformation process. Nevertheless, many organisations are still struggling to establish a effective cyber security protection model to protect their critical and sensitive assets. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21 今年,網罪科聯同香港課外活動主任協會 (HKEAMA) 再次舉辦網「樂」安全比賽2020/21 -今屆口號為「網絡安全,由你做起」。. 這個活動主要透過問答比賽的形式,提升學生和市民對網絡安全的認識。. 是次比賽,參賽者可以透過網站的文字內容、短片及相關連結 BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. VMWARE 產品多個漏洞 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 勒索軟件新趨勢 勒索軟件新趨勢. 勒索軟件是危害性及傳播性最大的網絡保安威脅之一,通過加密用戶設備上的文件,並要脅用戶繳納贖金才可解密。. 本中心一直持續關注勒索軟件的趨勢,並向我們求助的用戶提供保安建議。. 近期我們留意到學校遭受勒索軟件攻擊的案例有 通用隨插即用(UPNP) 功能服務顯露 潛在危機四伏 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21 今年,網罪科聯同香港課外活動主任協會 (HKEAMA) 再次舉辦網「樂」安全比賽2020/21 -今屆口號為「網絡安全,由你做起」。. 這個活動主要透過問答比賽的形式,提升學生和市民對網絡安全的認識。. 是次比賽,參賽者可以透過網站的文字內容、短片及相關連結 BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY OpenSSH Sensitive Information Disclosure Vulnerability. Last Update Date: 22 Aug 2018 Release Date: 16 Aug 2018 1890 Views. RISK: Medium Risk. Medium Risk. TYPE: Servers - Network Management. A vulnerability was identified in OpenSSH, a remote attacker can exploit this vulnerability to obtain Sensitive Information on the targeted system. VMWARE 產品多個漏洞 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 勒索軟件新趨勢 勒索軟件新趨勢. 勒索軟件是危害性及傳播性最大的網絡保安威脅之一,通過加密用戶設備上的文件,並要脅用戶繳納贖金才可解密。. 本中心一直持續關注勒索軟件的趨勢,並向我們求助的用戶提供保安建議。. 近期我們留意到學校遭受勒索軟件攻擊的案例有 通用隨插即用(UPNP) 功能服務顯露 潛在危機四伏 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. GOOGLE CHROME MULTIPLE VULNERABILITIES Google Chrome Multiple Vulnerabilities. Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service and remote code execution on the targeted system. CVE-2021-21193 is being exploited inthe wild.
ADOBE MONTHLY SECURITY UPDATE (JUN 2021) Adobe has released monthly security update for their products SAP PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in SAP Products, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, cross-site scripting and security restriction bypass on the targete CISCO PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Cisco Products, a remote attacker could exploit some of these vulnerabilities to trigger spoofing, remote code execution and security restriction bypass on thetargeted system.
GOOGLE CHROME MULTIPLE VULNERABILITIES 1 day ago · Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, data manipulation and sensitive information disclosure on the targeted ANDROID MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. BUILDING A CYBER SECURITY AND CLOUD PROTECTION FRAMEWORK Cyber security has become a crucial enabler for any successful digital transformation process. Nevertheless, many organisations are still struggling to establish a effective cyber security protection model to protect their critical and sensitive assets. APPLE SAFARI MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BIND 9 DNS DYNAMIC UPDATE DENIAL OF SERVICE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 勒索軟件新趨勢 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 VMWARE 產品多個漏洞 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 通用隨插即用(UPNP) 功能服務顯露 潛在危機四伏 HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. BEST PRACTICE GUIDE OF REMOTE DESKTOP (FOR CORPORATE Remote Desktop is a useful tool for remote control a computer, but misconfigured Remote Desktop is risky. Using weak password to protect Internet accessible remote desktop and sharing password to the technical support vendor are some of these examples. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 勒索軟件新趨勢 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 VMWARE 產品多個漏洞 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 通用隨插即用(UPNP) 功能服務顯露 潛在危機四伏 MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. SAP PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in SAP Products, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, cross-site scripting and security restriction bypass on the targete ADOBE MONTHLY SECURITY UPDATE (JUN 2021) Adobe has released monthly security update for their products IBM WEBSPHERE APPLICATION SERVER MULTIPLE VULNERABILITIES Multiple vulnerabilities have been identified in IBM WebSphere Application Server, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution and sensitive information disclosure on the targ ANDROID MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. GOOGLE CHROME MULTIPLE VULNERABILITIES 1 day ago · Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, data manipulation and sensitive information disclosure on the targeted BUILDING A CYBER SECURITY AND CLOUD PROTECTION FRAMEWORK Cyber security has become a crucial enabler for any successful digital transformation process. Nevertheless, many organisations are still struggling to establish a effective cyber security protection model to protect their critical and sensitive assets. BIND 9 DNS DYNAMIC UPDATE DENIAL OF SERVICE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. APPLE SAFARI MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. APPLE IPHONE AND IPOD TOUCH MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21 今年,網罪科聯同香港課外活動主任協會 (HKEAMA) 再次舉辦網「樂」安全比賽2020/21 -今屆口號為「網絡安全,由你做起」。. 這個活動主要透過問答比賽的形式,提升學生和市民對網絡安全的認識。. 是次比賽,參賽者可以透過網站的文字內容、短片及相關連結 NETGEAR PRODUCTS MULTIPLE VULNERABILITIES Netgear Products Multiple Vulnerabilities. Multiple vulnerabilities were identified in Netgear Products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security保安工具
BitDefener Home Scanner. ClamWin Antivirus. Dr. Web Online Scanner. ESET Online Scanner. F-Secure Online Scanner. Kaspersky Tools. McAfee Tools. Microsoft Malicious Software Removal Tool. Panda Security CloudCleaner.
求助:報告保安事故及求助 若想對通訊服務提出申訴,請致電政府熱線 1823 查詢相關機構嘅聯絡方法。. 本中心處理保安事故基於客觀數據作出分析。. 若你想報告保安事故,請準備以下資料﹕. 保安事故及徵狀的簡要陳述. 你的聯絡方法. 以下任何一種資料: 防毒軟件掃描結果 或 懷疑被 勒索軟件新趨勢 勒索軟件新趨勢. 勒索軟件是危害性及傳播性最大的網絡保安威脅之一,通過加密用戶設備上的文件,並要脅用戶繳納贖金才可解密。. 本中心一直持續關注勒索軟件的趨勢,並向我們求助的用戶提供保安建議。. 近期我們留意到學校遭受勒索軟件攻擊的案例有 殭屍網絡偵測及清理 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. 香港電腦保安事故協調中心 香港電腦保安事故協調中心(hkcert)是本港的資訊保安事故協調中心,為本地企業及互聯網用戶提供資訊保安事故的消息和防禦指引、事故回應及支援服務,及提高保安意識。 APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. 網「樂」安全比賽 2020/21 今年,網罪科聯同香港課外活動主任協會 (HKEAMA) 再次舉辦網「樂」安全比賽2020/21 -今屆口號為「網絡安全,由你做起」。. 這個活動主要透過問答比賽的形式,提升學生和市民對網絡安全的認識。. 是次比賽,參賽者可以透過網站的文字內容、短片及相關連結 NETGEAR PRODUCTS MULTIPLE VULNERABILITIES Netgear Products Multiple Vulnerabilities. Multiple vulnerabilities were identified in Netgear Products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security保安工具
BitDefener Home Scanner. ClamWin Antivirus. Dr. Web Online Scanner. ESET Online Scanner. F-Secure Online Scanner. Kaspersky Tools. McAfee Tools. Microsoft Malicious Software Removal Tool. Panda Security CloudCleaner.
求助:報告保安事故及求助 若想對通訊服務提出申訴,請致電政府熱線 1823 查詢相關機構嘅聯絡方法。. 本中心處理保安事故基於客觀數據作出分析。. 若你想報告保安事故,請準備以下資料﹕. 保安事故及徵狀的簡要陳述. 你的聯絡方法. 以下任何一種資料: 防毒軟件掃描結果 或 懷疑被 勒索軟件新趨勢 勒索軟件新趨勢. 勒索軟件是危害性及傳播性最大的網絡保安威脅之一,通過加密用戶設備上的文件,並要脅用戶繳納贖金才可解密。. 本中心一直持續關注勒索軟件的趨勢,並向我們求助的用戶提供保安建議。. 近期我們留意到學校遭受勒索軟件攻擊的案例有 殭屍網絡偵測及清理 如何於你的個人電腦 (視窗) 設定使用安全的 DNS 服 …TRANSLATE THIS PAGE 視窗 10. 於「 開始選單 」選擇「 設定 」。. 選擇「 網路和網際網路 」。. 選擇 「 變更介面卡選項 」。. (提示﹕請確保已選擇「 狀態 」頁) 假設你使用有線網絡,請選擇你上網所使用的「 乙太網路 」並使用 右鍵 選擇「 內容 」。. 選擇「 網際網路通訊協定 MICROSOFT MONTHLY SECURITY UPDATE (JUN 2021) Solutions. Before installation of the software, please visit the vendor web-site for more details. Apply fixes issued by the vendor. VMWARE PRODUCTS MULTIPLE VULNERABILITIES VMWare Products Multiple Vulnerabilities. Last Update Date: 27 Oct 2020 10:23 Release Date: 27 Oct 2020 1712 Views. RISK: Medium Risk. Medium Risk. TYPE: Operating Systems - VM Ware. Multiple vulnerabilities were identified in VMware products, a remote attacker could exploit some of these vulnerabilities to trigger cross sitescripting and
NETGEAR PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Netgear Products, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation, cross-site scripting and security restriction bypass on the targeted system. ADOBE MONTHLY SECURITY UPDATE (JUN 2021) Adobe has released monthly security update for their products SAP PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in SAP Products, a remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, cross-site scripting and security restriction bypass on the targete ANDROID MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Android, a remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, remote code execution and sensitive information disclosure on the targeted system. GOOGLE CHROME MULTIPLE VULNERABILITIES 1 day ago · Multiple vulnerabilities were identified in Google Chrome, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, data manipulation and sensitive information disclosure on the targetedSECURITY BULLETIN
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BUILDING A CYBER SECURITY AND CLOUD PROTECTION FRAMEWORK Cyber security has become a crucial enabler for any successful digital transformation process. Nevertheless, many organisations are still struggling to establish a effective cyber security protection model to protect their critical and sensitive assets. APPLE SAFARI MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL HKCERT Released Guideline for Upgrading TLS to Secure Versions. 28 Feb2020 6409 Views
MICROSOFT EDGE MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. Note: CVE-2021-21224 ISC BIND MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and MICROSOFT EDGE (CHROMIUM-BASED) REMOTE CODE EXECUTION A vulnerability was identified in Microsoft Edge (Chromium-Based), a remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITYOPENSSH 7 4 VULNERABILITYOPENSSH 7 6P1 VULNERABILITYOPENSSH VULNERABILITY HISTORYOPENSSH 6 6 1 VULNERABILITIESOPENSSH VULNERABILITY 2019 HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. MICROSOFT WINDOWS TCP/IP INTEGER OVERFLOW VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITYVSFTPD 234 BACKDOORVSFTPD 2 0 1 EXPLOITVSFTPD 2 0 5 EXPLOIT METASPLOITVSFTPD 2 2 2 EXPLOITVSFTPD 2 3 4 CVE A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's main server. HONG KONG COMPUTER EMERGENCY RESPONSE TEAM COORDINATION …RESOURCESRFC2350SECURITY BULLETINSECURITY BLOGNEWS CLIPPINGINCIDENTREPORTING
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. APPLE PRODUCTS MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Apple products, a remote attacker could exploit some of these vulnerabilities to trigger cross site scripting, denial of service condition, elevation of privilege, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system. BEWARE OF "ARE YOU AVAILABLE?" PHISHING SCAM EMAIL HKCERT Released Guideline for Upgrading TLS to Secure Versions. 28 Feb2020 6409 Views
MICROSOFT EDGE MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in Microsoft Edge, a remote attacker could exploit some of these vulnerabilities to trigger denial of service, remote code execution and security restriction bypass on the targeted system. Note: CVE-2021-21224 ISC BIND MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and MICROSOFT EDGE (CHROMIUM-BASED) REMOTE CODE EXECUTION A vulnerability was identified in Microsoft Edge (Chromium-Based), a remote attacker could exploit this vulnerability to trigger remote code execution on the targeted system. OPENSSH SENSITIVE INFORMATION DISCLOSURE VULNERABILITYOPENSSH 7 4 VULNERABILITYOPENSSH 7 6P1 VULNERABILITYOPENSSH VULNERABILITY HISTORYOPENSSH 6 6 1 VULNERABILITIESOPENSSH VULNERABILITY 2019 HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. MICROSOFT WINDOWS TCP/IP INTEGER OVERFLOW VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. SPLUNK ENTERPRISE INFORMATION DISCLOSURE VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. VSFTPD COMPROMISED SOURCE PACKAGES BACKDOOR VULNERABILITYVSFTPD 234 BACKDOORVSFTPD 2 0 1 EXPLOITVSFTPD 2 0 5 EXPLOIT METASPLOITVSFTPD 2 2 2 EXPLOITVSFTPD 2 3 4 CVE A vulnerability has been identified in vsftpd, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the distribution of backdoored vsftpd version 2.3.4 source code packages (vsftpd-2.3.4.tar.gz) via the project's main server.SECURITY GUIDELINE
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness.SECURITY BULLETIN
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness.SECURITY BULLETIN
HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness.SECURITY TOOLS
Provides web links for security tools of different areas, such as defense, assessment, analysis, data protection, mobile, etc. HKCERT SECURITY ALERT: LOCKY RANSOMWARE IN THE WILD HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. BOTNET DETECTION AND CLEANUP Botnet is one of the major security threats nowadays. Smart devices such as computers, mobile phones, and IP cameras run the risk of being infected and becoming part of a botnet. Hackers can remote control them to participate in illegal activities. ISC BIND MULTIPLE VULNERABILITIES Multiple vulnerabilities were identified in BIND, a remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and VMWARE ESX SERVER MULTIPLE VULNERABILITIES HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. MICROSOFT WINDOWS TCP/IP INTEGER OVERFLOW VULNERABILITY HKCERT is the centre for coordinating computer security incident response for local enterprises and Internet Users. It disseminates information, provides advices on preventive measures against security threats and promotes information security awareness. ORACLE SUN JAVA JDK, JRE AND SDK MULTIPLE VULNERABILITIES Multiple vulnerabilities have been identified in Oracle Sun Java JDK, JRE and SDK, which could be exploited by remote attackers or malicious users to manipulate or gain knowledge of sensitive information, bypass restrictions, cause a denial of service or compromise a vulnerablesystem.
Your browser disabled javascript now. Please enable javacript and reload the page, otherwise some function will not work properly.*
* About Us
* Mission
* Our Services
* Our Team
* Press Centre
* Contact Us
* RFC2350
* Alerts & News
* Security Bulletin
* Security Blog
* News Clipping
* Services
* Incident Reporting* Subscription
* Events / Training
* Publications
* Newsletters
* Hong Kong Security Watch Report * Play Store's Apps Security Risk Report * Security Guideline * Botnet Detection & Cleanup * Newspaper Column Articles* Statistics
* Resources
* Security Tools
* FAQ
* Useful Resources / Links* Help
* Open Data
* Mobile
* Mobile Apps
* Mobile Website
* Mobile Security Tools* RSS
Getting Help
* Incident Reporting* Useful Resources
Subscription
Receiving timely security alert information. Securing your systembetter
Highlight
Hong Kong Security Watch Report (Q1 2020) "SSH Hong Kong Enterprise Cyber Security Readiness Index Survey" Down 2.4 Points to 46.9 Staying Vigilant for Cyber Threats in StormyTimes
HKCERT proposes 10 measures to secure Zoom Meetings HKCERT Released Guideline for Upgrading TLS to Secure Versions HKCERT Releases New Study to Raise Security Awareness of BluetoothLow Energy Devices
HKCERT website will only support more secure TLS versions from April 1, 2020 onwards Assessing the Security of Remote Access Services Guideline Six Security Tips for Home Office Watch out for Phishing Attacks Using False Information on InfectiousDisease
*
*
*
*
*
*
*
*
*
*
Security Bulletin
Mozilla Firefox Multiple Vulnerabilities2020/06/03
Apple Products Multiple Vulnerabilities2020/06/03
Cisco NX-OS Denial Of Service Vulnerability2020/06/03
Fortinet FortiClient Sensitive Information Disclosure Vulnerability2020/06/03
Android Multiple Vulnerabilities2020/06/03
Security Blog
HKCERT Security Newsletter (June 2020 Issue)2020/06/01
Hong Kong Security Watch Report (Q1 2020)2020/05/19
"SSH Hong Kong Enterprise Cyber Security Readiness Index Survey" Down 2.4 Points to 46.9 Staying Vigilant for Cyber Threats in StormyTimes
2020/05/13
HKCERT Releases New Study to Raise Security Awareness of ZigBeeDevices
2020/05/08
News Clipping
NTT warns its Singapore cloud was hacked, Japanese customer datacompromised
2020/05/29
New Android Flaw Affecting Over 1 Billion Phones Let AttackersHijack Apps
2020/05/26
New iOS Jailbreak Tool Works on iPhone Models iOS 11 to iOS 13.52020/05/26
Insider threat? Pffft. Hackers on the outside are the ones mostly making off with your private biz data, says Verizon2020/05/26
‘Coronavirus Report’ Emails Spread NetSupport RAT, MicrosoftWarns
2020/05/22
Finding Best Security Outsourcing Alternative for YourOrganization
2020/05/20
EasyJet admits data of nine million hacked2020/05/20
Warning: Citrix ShareFile Flaw Could Let Attackers Steal CorporateSecrets
2020/05/06
A hacker group tried to hijack 900,000 WordPress sites over thelast week
2020/05/06
Hackers Target Remote Workers With Fake Zoom Downloader2020/05/04
Event Highlight
Securing Microservices in Kubernetes Container Environment for Serverless PaaS Cloud New2020/07/29
Cloud Security Certification | CCSP® – Certified Cloud Security Professional Official Training New2020/07/24
Cyber Threat Intelligence Training SeriesNew
2020/07/22
Cybersecurity Certification | CISSP® – Certified Information Systems Security Professional Official TrainingNew
2020/06/12
Build a Secure Cyberspace 2020 "Cyber Security Challenges in the Pandemic" Webinar2020/05/08
*
* About Us
* Mission
* Our Services
* Our Team
* Press Centre
* Contact us
* Alerts & News
* Security Bulletin
* Security Blog
* News Clipping
* Services
* Incident Reporting* Subscription
* Event / Training
* Publications & Resources* Newsletter
* Security Guideline* Security Tools
* FAQ
* Statistics
* Useful Resources / Links * Verify the Identity * How to Identify the Homepage * Our PGP Public Key* RSS
* RSS
Mobile
/ Accessible Version Privacy Policy | Disclaimer |Copyright
This page is best viewed with browsers Chrome 38, Firefox 27, Internet Explorer 11 or Safari 7 (Mac OS), or above. Sitemap | Verify the identity of this websiteA A A
中文
| English
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0