Security Blog
Defacement Attacks: Understanding and Prevention
![](/f/blog/912217/240p0/istock-1365276333.jpg)
Deepfake: Where Images Don't Always Speak Truth
![](/f/blog/912175/240p0/5413%20%281%29_1710142728.jpg)
How To Protect Your Data in Quantum Age
![](/f/blog/912164/240p0/dataquantum_banner.jpg)
Taking Security Best Practice During Festive Season
![](/f/blog/911870/240p0/festive_season_banner.jpg)
Raise Public Awareness of Cyber Security: Guard against Risks of Unknown WhatsApp Video Calls
![](/f/blog/911756/240p0/whatsapp.jpg)
Protecting Critical Infrastructures: IT/OT Convergence vs MITM Attacks
![](/f/blog/911739/240p0/OT_MITM_Banner.jpg)
Ransomware Trends Q2 2023: Surge in Attacks Across Asia-Pacific, Persistent Multiple Extortion, and Evolving Threat Landscape
![](/f/blog/911537/240p0/iStock-1289698560.jpg)
HKCERT Alerts the Public on Preventive Measures Against WhatsApp Account Theft
![](/f/blog/911468/240p0/iStock-1048818328.jpg)
Comprehensive Guide to Social Media Scams: Setting up Defense to Safeguard Your Personal Information
![](/f/blog/911391/240p0/iStock-1453891792.jpg)
Introducing the New HKCERT “All-Out Anti-Phishing” Thematic Page
![](/f/blog/911381/240p0/AllOutAntiPhishing-01.jpg)