Uncategorized

Daily Communication——Release of Code on GitHub

March 21, 2019 | Mina Hao

Case Analysis Before compromising a website or system, a hacker usually searches for related information beforehand. Code repositories are a major target. A security-unaware developer may upload code to a public platform, providing an opportunity for hackers to obtain API accounts or security holes by analyzing the uploaded code.

Daily Communication——Business Chat Groups

March 15, 2019 | Mina Hao

Case Analysis Chat groups convenience communication, but contain great risks, which include ill-disposed persons impersonating the company’s employees, information disclosure as a result of chat group hacking, and resigned employees lurking in the group for malicious purposes.

Genius? Lunatic? Maybe Both (III)

February 25, 2019 | Mina Hao

Today, people live in a connected world. No matter how far away they are from one another, the Internet can bring them together, talking face to face in cyberspace. The prevalence of big data and the super powerful computing capability of machines herald a golden era of artificial intelligence, known as “the third wave”. New […]

NSFOCUS Cloud-in-a-Box Wins 2019 InfoSecurity Product Guide Excellence Award

February 15, 2019 | Devika Jain

NSFOCUS Cloud-in-a-Box Wins 2019 InfoSecurity Product Guide Excellence Award Four months after it was released to the general public, our newest cloud security service Cloud-in-a-Box has been named a bronze winner in the 15th annual 2019 InfoSecurity Product Guide’s Global Excellence Awards in the ‘Best Innovation in Cloud Security’ category. In this day and age, […]

Mobile Office——Sum-up

February 15, 2019 | Mina Hao

Security Tips/Takeaways

Mobile Office—SIM and SD Card Security

January 31, 2019 | Mina Hao

Case AnalysisCase Analysis If you do not report the loss of the SIM card after your phone is lost, a hacker may use it to obtain SMS verification codes. Activation of the quick pay service requires only the ID card number, bank card number, and SMS verification code.

Genius? Lunatic? Maybe Both (II)

January 28, 2019 | Mina Hao

The ubiquity of the Internet is attracting more and more youths to the computer industry, especially the hacker community that holds a supreme position in the realm of cyber security. Every person eager to be part of the IT industry seems to be able to get something from it, ranging from appearing cool to making […]

Mobile Office — Two-Step Verification

January 25, 2019 | Mina Hao

Case Analysis It is a common practice to protect an account with a password. However, the account will be compromised if the password is disclosed. Now many mobile phones or apps support two-step verification. When detecting a login to your account from another phone, the mechanism requires the other form of authentication, for example, a […]

2019 Predictions: Email Attachments, IoT, and Cryptominers to be Security Pain Points

January 23, 2019 | Devika Jain

  Data breaches in 2018 compromised personal information of millions of people around the world, most notably from large corporations such as Facebook, Marriott, T-Mobile and Quora. Seemingly every week there is a new breach reported, and consumers have taken notice. In the past year, the average number of overall daily searches for keywords such […]

Mobile Office——SMS phishing

January 18, 2019 | Mina Hao

Case Analysis This story starts from an SMS message and ends with financial loss, sounding just like an ordinary telecom fraud. But it is distinctive in that a malicious link and a web page that contains a trojan are leveraged, indicating that the attacker is quite tech-savvy. After the mobile phone is infected with the […]