Skip to Navigation Skip to main content

ICT Bulletins

News feed provided by Computerworld Hong Kong and SMBWorld.

 

31-10-2014
共建安全網絡11月底研討會

香港電腦保安事故協調中心 (HKCERT)、政府資訊科技總監辦公室 (OGCIO) 與香港警務處 (HKPF) 將舉辦以上公開研討會。 閱讀全文

View More
31-10-2014
億萬富翁人數倍增 全球不平等現象惡化

樂施會發表研究報告《實現平等:消除貧富差距》(“Even it Up: Time to End Extreme Inequality”),警告持續惡化的不平等現象,將令滅貧成效倒退至幾十年前的 閱讀全文

View More
31-10-2014
DDos攻擊規模及流量 按年升四倍

Akamai 發表「2014年第三季互聯網發展狀況概述 – 保安報告」,Akamai旗下Prolexic安全工程及科研團隊Prolexic Security Engineering & Research Team;PLXsert是分佈式阻 閱讀全文

View More
31-10-2014
思科及港視推網購平台

思科及香港電視宣佈,利用本港首個香港互聯網交換中心 (HKIX) 的100GE服務,為本地網上購物及娛樂業界的發展踏出領先的一步。 閱讀全文

View More
31-10-2014
萬聖節網上什麼最受歡迎

每年萬聖節,通常與靈異的事物聯繫起來。 閱讀全文

View More
30-10-2014
6 ways to maximize your IT training budget

Although the economy is picking up ever so slightly, IT departments remain on the lookout for ways to do more with less -- fewer people, fewer resources, less Ed Tittel

View More
30-10-2014
Internet devices, easy-to-use tools fuel DDoS attacks

Distributed Denial of Service (DDoS) attack sizes and volumes increased four-fold year-over-year in Q3 as thriving criminal industry taps into Internet devices and spreads easy-to-use tools."DDoS attack size and volume have gone through the roof this year," said John Summers, vice president, Security Business Unit at Akamai Technologies. Networks Asia staff

View More
30-10-2014
Baidu getting more traffic from mobile devices than PCs

In a sign that more Chinese are relying on their smartphones to go online, local search giant Baidu said its mobile internet traffic had surpassed traffic from PCs during the third quarter.Baidu, China's largest search engine, noted the shift in an earnings call Thursday, when the company's CEO Robin Li said its traffic from mobile devices represented over half of the total user traffic. Michael Kan

View More
30-10-2014
EMC unveils hybrid cloud solution

Storage vendor EMC has unveiled a new hybrid Cloud solution integrating hardware, software and services from EMC and VMware and Microsoft.The solution enables IT-as-a-service in as few as 28 days, according to a company statement.The EMC Enterprise Hybrid Cloud Solution enables IT to be a broker of trusted cloud services while maintaining the freedom to choose the Management and Orchestration technology upon which the hybrid cloud is standardized. Brian Karlovsky

View More
30-10-2014
Xiaomi grows to world's third largest smartphone vendor

Phones from Xiaomi still haven't arrived in the US, but the company's booming sales in China have been enough to make it the third largest smartphone vendor in the world.Xiaomi reached the ranking, behind Apple and Samsung, in the third quarter, said research firms IDC and Strategy Analytics on Thursday.The Chinese vendor only began selling phones three years ago but it has quickly risen to become a leading vendor in its home market, by offering feature-packed Android phones at affordable prices. Michael Kan

View More
30-10-2014
How to verify if a data breach is a hoax

The notoriety that comes with taking credit for a data breach is alluring. Declaring a successful data breach can suddenly bring a lot of attention, which is why posting bogus data is attractive.For companies and organizations, it's a real headache, since an allegation of a breach can immediately pose public relations challenges."The speed of the news cycle is a lot faster than the speed of the incident response process," said Allison Nixon, a threat researcher with consultancy Deloitte. Jeremy Kirk

View More
30-10-2014
Cyberespionage group attacks against Outlook Web App users

A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App. Lucian Constantin

View More
30-10-2014
Cybercriminals create platform for automating rogue credit card charges

Cybercriminals have a new tool to make the most of stolen credit card details before payment processors detect the fraud, security researchers warn.A Web-based application called the Voxis Platform is being advertised on underground forums as a tool for cashing out money from stolen credit cards by automating fraudulent purchases, according to security researchers from cybercrime intelligence firm IntelCrawler. Lucian Constantin

View More
30-10-2014
Where should the CISO department reside?

If we look at the headlines surrounding recent data breaches, we might conclude that the role of the chief information security officer (CISO) has never been more Brian Engle and Renee Guttman

View More
30-10-2014
Planning for an effective security tabletop test

Tabletop exercises enable organizations to analyze potential emergency situations in an informal environment, and are designed to foster co Bob Violino

View More