{"id":5303,"date":"2025-01-21T15:00:48","date_gmt":"2025-01-21T07:00:48","guid":{"rendered":"https:\/\/edon.asia\/?p=5303"},"modified":"2025-01-21T15:17:49","modified_gmt":"2025-01-21T07:17:49","slug":"hkcert-2024-phishing-attacks-surge-and-top-5-cybersecurity-risks-for-2025","status":"publish","type":"post","link":"https:\/\/edon.asia\/en\/hkcert-2024-phishing-attacks-surge-and-top-5-cybersecurity-risks-for-2025\/","title":{"rendered":"2024\u5e74\u91e3\u9b5a\u653b\u64ca\u6fc0\u589e\u53ca2025\u5e74\u4e94\u5927\u7db2\u7d61\u5b89\u5168\u98a8\u96aa"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5303\" class=\"elementor elementor-5303\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a48d224 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a48d224\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6fdd272\" data-id=\"6fdd272\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd312ed elementor-widget elementor-widget-spacer\" data-id=\"cd312ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88b8b4c elementor-widget elementor-widget-heading\" data-id=\"88b8b4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default translation-block\">HKCERT: \n2024 Phishing Attacks Surge and Top 5 Cybersecurity Risks for 2025<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9f4c2e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"9f4c2e6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74c1aae\" data-id=\"74c1aae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f098a8f elementor-widget elementor-widget-image\" data-id=\"f098a8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"447\" src=\"https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f-1024x572.png\" class=\"attachment-large size-large wp-image-5304\" alt=\"\" srcset=\"https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f-1024x572.png 1024w, https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f-300x167.png 300w, https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f-768x429.png 768w, https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f-18x10.png 18w, https:\/\/edon.asia\/wp-content\/uploads\/2025\/01\/8a31d5b6d465c561815426a43e04c9f.png 1376w\" sizes=\"(max-width: 800px) 100vw, 800px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e98453c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"e98453c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-baaf2cb\" data-id=\"baaf2cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34c6cb0 elementor-widget elementor-widget-text-editor\" data-id=\"34c6cb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #ffffff; letter-spacing: 0.3px; font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); background-color: var( --e-global-color-secondary ); font-size: 1rem;\">In 2024, Hong Kong\u2019s cybersecurity landscape saw a significant uptick in cybercrime, with phishing attacks becoming a major concern. The latest report from the Hong Kong Cybersecurity Incident Response Team (\u201cHKCERT\u201d) reveals that the agency responded to 12,500 security incidents last year, more than 62% of which were phishing-related, marking a staggering 108% increase from the previous year. This represents the most severe cybersecurity situation in the past five years. Additionally, the number of malicious links associated with phishing attacks rose to 48,000\u2014an increase of 50% from 2023.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Phishing attacks have primarily targeted the banking, financial services, and electronic payment sectors, which have become prime targets for cybercriminals. However, other industries such as social media, e-commerce, tech companies, and public services have also experienced significant security threats.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">Malware incidents skyrocketed in 2024, with a nearly fivefold increase compared to the previous year. The majority of these attacks focused on smart devices, particularly trojans disguised as legitimate apps. Once downloaded, these malicious programs steal sensitive information or compromise the device\u2019s functionality.<\/span><\/p>\n<p><span style=\"color: #ffffff;\">With cyber threats intensifying, HKCERT spokesperson Chan Chung-man stressed the importance of improving cybersecurity awareness for both businesses and individuals. He recommended that organizations not only deploy robust security tools but also conduct regular security audits and penetration testing to protect their digital assets. It's crucial to have effective incident response protocols in place.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-edde9a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"edde9a4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51caef9\" data-id=\"51caef9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b1ba17 elementor-widget elementor-widget-text-editor\" data-id=\"2b1ba17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ffffff;\"><strong>Top 5 Cybersecurity Risks to Watch in 2025<\/strong><\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d879cad elementor-widget elementor-widget-text-editor\" data-id=\"d879cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Looking ahead, HKCERT has identified five key cybersecurity risks to monitor in 2025:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fa43c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4fa43c7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f0c315\" data-id=\"2f0c315\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f218a60 wpr-table-align-items-center elementor-widget__width-initial wpr-data-table-type-custom wpr-entry-info-yes elementor-widget elementor-widget-wpr-data-table\" data-id=\"f218a60\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;table_items_per_page&quot;:10}\" data-widget_type=\"wpr-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wpr-export-search-cont\"><div class=\"wpr-export-search-inner-cont\"><div class=\"wpr-table-export-button-cont\"><button class=\"wpr-button wpr-xls\">Export XLS<\/button><button class=\"wpr-button wpr-csv\">Export CSV<\/button><\/div><div class=\"wpr-table-live-search-cont\"><input type=\"search\" class=\"wpr-table-live-search\" placeholder=\"Type Here To Search...\"><i class=\"fas fa-search wpr-search-input-icon\"><\/i><\/div><\/div><\/div>\t\t\n\t\t<div class=\"wpr-table-container\">\n\t\t<div class=\"wpr-table-inner-container wpr-hide-table-before-arrange\" data-table-sorting=\"yes\" data-custom-pagination=\"yes\" data-row-pagination=\"\" data-entry-info=\"yes\" data-rows-per-page=\"10\">\n\n\t\t\n\t\t\t<table class=\"wpr-data-table\" id=\"wpr-data-table\">\n\t\t\t\t\t\t\t\t\n\t\t\t\t<thead>\n\t\t\t\t\t<tr class=\"wpr-table-head-row wpr-table-row\">\n\t\t\t\t\t\n\t\t\t\t\t\t<th class=\"wpr-table-th elementor-repeater-item-52ca5ea\" colspan=\"1\">\n\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">1.\tThird-Party Security Risks:<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-sorting-icon\"><i class=\"fas fa-sort\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-sorting-icon\"><i class=\"fas fa-sort\"><\/i><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/th>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<th class=\"wpr-table-th elementor-repeater-item-2088b10\" colspan=\"1\">\n\t\t\t\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">Collaborations with external partners could introduce new vulnerabilities into networks and systems.<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-sorting-icon\"><i class=\"fas fa-sort\"><\/i><\/span>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-sorting-icon\"><i class=\"fas fa-sort\"><\/i><\/span>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/th>\n\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t\t<\/thead>\n\n\t\t\t\t<tbody>\n\t\t\t\t\t\t\t\t\t<tr class=\"wpr-table-body-row wpr-table-row elementor-repeater-item-461f8e7 wpr-odd\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-9a1c425 wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t2.\tData Leaks and Prompt Hacking from AI:\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-d4fa181 wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\tThe increasing use of AI technology could be exploited by hackers to steal sensitive data or inject malicious code.\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t<tr class=\"wpr-table-body-row wpr-table-row elementor-repeater-item-8599610 wpr-even\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-a34434b wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t3.\tAI-Driven Cyberattacks:\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-180b6c7 wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\tAI-powered tools enable cybercriminals to launch more sophisticated and targeted attacks.\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t<tr class=\"wpr-table-body-row wpr-table-row elementor-repeater-item-37156b7 wpr-odd\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-c312764 wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t4.\tCyberattacks on Critical Infrastructure:\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-9463f0c wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\tPublic infrastructure, including water, electricity, and transportation systems, will remain high-value targets for cyberattacks.\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t\t<tr class=\"wpr-table-body-row wpr-table-row elementor-repeater-item-8157a5a wpr-even\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-c3b241a wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t5.\tIoT Security Risks:\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"elementor-repeater-item-f1d14b6 wpr-table-td\">\n\n\t\t\t\t\t\t\t\t<div class=\"wpr-td-content-wrapper\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t \n\t\t\t\t\t\t\t\t\t\t\t<span class=\"wpr-table-text\">\n\t\t\t\t\t\t\t\t\t\t\t\tThe growing number of Internet of Things (\u201cIoT\u201d) devices presents a major security challenge, as these devices are often vulnerable to attack.\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t\t<\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t\t<\/div>\n    \t\r\n\t\t<div class=\"wpr-table-pagination-outer-cont\">\r\n\t\t<div class=\"wpr-table-pagination-cont\">\r\n\t\t\t\t\t<div class=\"wpr-entry-info\"><\/div>\r\n\t\t\t\t<ul class=\"wpr-table-custom-pagination\">\r\n\t\t\t<div class=\"wpr-table-custom-pagination-inner-cont\">\r\n\t\t\t\t\t\t\t\t<li class='wpr-table-custom-pagination-prev wpr-table-prev-next wpr-table-custom-pagination-list'>\r\n\t\t\t\t\t<i class=\"fas fa-angle-left\"><\/i>\t\t\t\t<\/li>\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t<li class=\"wpr-table-custom-pagination-list wpr-table-custom-pagination-list-item wpr-active-pagination-item\">\r\n\t\t\t\t\t\t\t<span>1<\/span>\r\n\t\t\t\t\t\t<\/li>\r\n\t\r\n\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<li class='wpr-table-custom-pagination-next wpr-table-prev-next wpr-table-custom-pagination-list wpr-table-prev-arrow wpr-table-arrow'>\r\n\t\t\t\t\t<i class=\"fas fa-angle-right\"><\/i>\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/ul>\r\n\t\t<\/div>\r\n\t\t<\/div>\r\n\r\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81cc967 elementor-widget elementor-widget-text-editor\" data-id=\"81cc967\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>HKCERT tested digital displays from eight different brands and discovered 20 security vulnerabilities, 10 of which were deemed high-risk and required immediate patching. As a result, HKCERT has issued six key security recommendations: strengthening system and software security, improving network defenses, enhancing physical security, developing comprehensive data protection policies, managing content security, and enforcing secure account management practices.<br \/><a href=\"https:\/\/inews.hket.com\/article\/3890298\/%E7%B6%B2%E7%B5%A1%E5%AE%89%E5%85%A8%EF%BD%9C%E6%95%B8%E7%A2%BC%E9%A1%AF%E7%A4%BA%E5%B1%8F%E6%BD%9B%E5%9C%A8%E9%A2%A8%E9%9A%AA%E5%A2%9E%E3%80%80%E6%9C%80%E5%BF%AB%E4%B8%89%E7%A7%92%E5%8D%B3%E8%83%BD%E5%8F%96%E5%BE%97%E6%8E%A7%E5%88%B6%E6%AC%8A\" target=\"_blank\" rel=\"noopener\">**For more details, please refer to Original source: Hong Kong Economic Journal (\u201cHKEJ\u201d)**<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8468349 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"8468349\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e9fd9f\" data-id=\"9e9fd9f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a5cea34 elementor-widget elementor-widget-text-editor\" data-id=\"a5cea34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #ffffff;\"><strong>Conclusion<\/strong><\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bddf0de elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"bddf0de\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cd6e457\" data-id=\"cd6e457\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8559c5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"b8559c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity remains a pressing concern in today\u2019s increasingly connected world. As cyberattacks grow more sophisticated, businesses and individuals must stay vigilant, continuously improving their security practices to protect sensitive information and ensure the integrity of the digital ecosystem.<\/p><p><a href=\"https:\/\/inews.hket.com\/article\/3890248\/%E7%B6%B2%E7%B5%A1%E5%AE%89%E5%85%A8%EF%BD%9C%E7%B6%B2%E7%B5%A1%E9%87%A3%E9%AD%9A%E4%BA%8B%E6%95%85%E5%89%B5%E4%BA%94%E5%B9%B4%E6%96%B0%E9%AB%98%E3%80%80HKCERT%E7%B1%B2%E6%B3%A8%E6%84%8FAI%E7%94%9F%E6%88%90%E5%85%A7%E5%AE%B9%E8%A2%AB%E9%A8%8E%E5%8A%AB\" target=\"_blank\" rel=\"noopener\">**For more details, please refer to Original source: Hong Kong Economic Journal (\u201cHKEJ\u201d)**<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-091ded0 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"091ded0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a8cac83\" data-id=\"a8cac83\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\u9999\u6e2f\u7db2\u7d61\u5b89\u5168\u4e8b\u6545\u5354\u8abf\u4e2d\u5fc3\uff1a2024\u5e74\u91e3\u9b5a\u653b\u64ca\u6fc0\u589e\u53ca2025\u5e74\u4e94\u5927\u7db2\u7d61\u5b89\u5168\u98a8\u96aa 2024\u5e74\uff0c\u9999\u6e2f\u7db2\u7d61\u5b89\u5168\u5f62\u52e2\u56b4\u5cfb\uff0c\u5c24\u5176\u662f\u7db2\u7d61\u91e3\u9b5a\u653b\u64ca\u7684\u589e\u9577\u986f\u793a\u51fa\u7db2\u7d61\u72af\u7f6a\u6d3b\u52d5\u7684\u65e5\u76ca\u7316\u7357\u3002\u6839\u64da\u9999\u6e2f\u7db2\u7d61\u5b89\u5168\u4e8b\u6545\u5354\u8abf\u4e2d\u5fc3\uff08\u201cHKCERT\u201d\uff09\u6700\u65b0\u516c\u5e03\u7684\u5831\u544a\uff0c\u904e\u53bb\u4e00\u5e74\u8a72\u6a5f\u69cb\u8655\u7406\u4e861.25\u842c\u5b97\u4fdd\u5b89\u4e8b\u6545\uff0c\u5176\u4e2d\u8d85\u904e62%\u70ba\u7db2\u7d61\u91e3\u9b5a\u6848\u4ef6\uff0c\u6bd4\u53bb\u5e74\u589e\u52a0\u4e861.08\u500d\uff0c\u662f\u904e\u53bb\u4e94\u5e74\u4f86\u7684\u6700\u56b4\u91cd\u60c5\u6cc1\u3002\u8207\u6b64\u540c\u6642\uff0c\u91dd\u5c0d\u9019\u4e9b\u653b\u64ca\u7684\u60e1\u610f\u93c8\u63a5\u6578\u91cf\u66f4\u9054\u52304.8\u842c\u689d\uff0c\u8f03\u53bb\u5e74\u6fc0\u589e\u4e861.5\u500d\u3002 \u7db2\u7d61\u91e3\u9b5a\u653b\u64ca\u7684\u4e3b\u8981\u76ee\u6a19\u96c6\u4e2d\u5728\u9280\u884c\u3001\u91d1\u878d\u53ca\u96fb\u5b50\u652f\u4ed8\u9818\u57df\uff0c\u9019\u4e9b\u884c\u696d\u7121\u7591\u6210\u70ba\u9ed1\u5ba2\u653b\u64ca\u7684\u91cd\u9ede\u3002\u793e\u4ea4\u5a92\u9ad4\u3001\u5373\u6642\u901a\u8a0a\u8edf\u4ef6\u3001\u96fb\u5b50\u5546\u8cbf\u5e73\u53f0\u3001\u79d1\u6280\u4f01\u696d\u53ca\u516c\u5171\u670d\u52d9\u7b49\u4e5f\u540c\u6a23\u9762\u81e8\u5de8\u5927\u5b89\u5168\u5a01\u8105\u3002 2024\u5e74\uff0c\u60e1\u610f\u8edf\u4ef6\u7684\u6578\u91cf\u5927\u5e45\u4e0a\u5347\uff0c\u589e\u5e45\u9054\u52304.8\u500d\u3002\u5927\u591a\u6578\u7684\u60e1\u610f\u8edf\u4ef6\u653b\u64ca\u91dd\u5c0d\u667a\u80fd\u88dd\u7f6e\uff0c\u5c24\u5176\u662f\u6728\u99ac\u75c5\u6bd2\uff0c\u9019\u4e9b\u75c5\u6bd2\u901a\u5e38\u507d\u88dd\u6210\u6b63\u5e38\u61c9\u7528\u7a0b\u5f0f\uff0c\u8a98\u4f7f\u7528\u6236\u4e0b\u8f09\u4e26\u5b89\u88dd\uff0c\u5f9e\u800c\u7aca\u53d6\u654f\u611f\u8cc7\u8a0a\u6216\u7834\u58de\u8a2d\u5099\u529f\u80fd\u3002 HKCERT\u767c\u8a00\u4eba\u9673\u4ef2\u6587\u8868\u793a\uff0c\u96a8\u8457\u7db2\u7d61\u5b89\u5168\u5a01\u8105\u7684\u65e5\u76ca\u52a0\u5287\uff0c\u4f01\u696d\u8207\u500b\u4eba\u90fd\u61c9\u8a72\u52a0\u5f37\u5c0d\u7db2\u7d61\u98a8\u96aa\u7684\u8a8d\u8b58\u8207\u9632\u7bc4\u63aa\u65bd\u3002\u4ed6\u5efa\u8b70\uff0c\u9664\u4e86\u8981\u8a2d\u7acb\u9069\u7576\u7684\u7db2\u7d61\u61c9\u8b8a\u63aa\u65bd\uff0c\u9084\u61c9\u8a72\u914d\u7f6e\u6709\u6548\u7684\u5b89\u5168\u9632\u8b77\u5de5\u5177\uff0c\u4e26\u5b9a\u671f\u9032\u884c\u4fdd\u5b89\u5be9\u8a08\u548c\u6ef2\u900f\u6e2c\u8a66\uff0c\u4ee5\u4fdd\u969c\u6578\u78bc\u8cc7\u7522\u7684\u5b89\u5168\u3002 2025\u5e74\u4e94\u5927\u7db2\u7d61\u5b89\u5168\u98a8\u96aa \u57282024\u5e74\u7d93\u9a57\u7684\u57fa\u790e\u4e0a\uff0cHKCERT\u5206\u6790\u4e26\u9810\u6e2c\u4e862025\u5e74\u7db2\u7d61\u5b89\u5168\u7684\u4e94\u5927\u98a8\u96aa\uff1a 1. \u7b2c\u4e09\u65b9\u98a8\u96aa\u4e0a\u5347 \u4f01\u696d\u8207\u5916\u90e8\u5408\u4f5c\u5925\u4f34\u7684\u806f\u7e6b\uff0c\u53ef\u80fd\u5e36\u4f86\u5b89\u5168\u96b1\u60a3\u3002 2. \u5927\u578b\u8a9e\u8a00\u6a21\u578b\u8cc7\u6599\u5916\u6d29\u8207\u6295\u6bd2\u98a8\u96aa\uff1a AI\u6280\u8853\u7684\u61c9\u7528\u53ef\u80fd\u6210\u70ba\u9ed1\u5ba2\u9032\u884c\u8cc7\u6599\u5916\u6d29\u6216\u6ce8\u5165\u60e1\u610f\u4ee3\u78bc\u7684\u6e20\u9053\u3002 3. \u4eba\u5de5\u667a\u80fd\u52a9\u9577\u7db2\u7d61\u653b\u64ca\u53ca\u8a50\u9a19\uff1a AI\u6280\u8853\u7684\u767c\u5c55\u4f7f\u5f97\u653b\u64ca\u8005\u80fd\u5920\u66f4\u6709\u6548\u5730\u9032\u884c\u8a50\u9a19\u6d3b\u52d5\u3002 4. \u95dc\u9375\u57fa\u790e\u8a2d\u65bd\u7db2\u7d61\u653b\u64ca\u589e\u52a0\uff1a \u6c34\u96fb\u3001\u4ea4\u901a\u7b49\u516c\u5171\u57fa\u790e\u8a2d\u65bd\u7684\u7db2\u7d61\u5b89\u5168\u5c07\u6210\u70ba\u653b\u64ca\u7684\u91cd\u9ede\u3002 5. \u7269\u806f\u7db2\uff08\u201dIoT\u201d\uff09\u6280\u8853\u7684\u5b89\u5168\u98a8\u96aa\uff1a \u96a8\u8457IoT\u8a2d\u5099\u666e\u53ca\uff0c\u9019\u4e9b\u8a2d\u5099\u6210\u70ba\u4e86\u653b\u64ca\u8005\u7684\u6f5b\u5728\u76ee\u6a19\u3002 \u503c\u5f97\u6ce8\u610f\u7684\u662f\uff0cHKCERT\u5c0d8\u7a2e\u4e0d\u540c\u54c1\u724c\u7684\u6578\u78bc\u986f\u793a\u5c4f\u9032\u884c\u4e86\u5b89\u5168\u6e2c\u8a66\uff0c\u767c\u73fe20\u500b\u5b89\u5168\u6f0f\u6d1e\uff0c\u5176\u4e2d\u670910\u500b\u5c6c\u65bc\u9ad8\u98a8\u96aa\u7d1a\u5225\uff0c\u6025\u9700\u4fee\u5fa9\u3002\u70ba\u6b64\uff0cHKCERT\u63d0\u51fa\u4e86\u516d\u5927\u4fdd\u5b89\u5efa\u8b70\uff0c\u5305\u62ec\u52a0\u5f37\u7cfb\u7d71\u53ca\u8edf\u4ef6\u5b89\u5168\u3001\u7db2\u7d61\u5b89\u5168\u3001\u5be6\u9ad4\u4fdd\u5b89\u3001\u6578\u64da\u4fdd\u8b77\u653f\u7b56\u3001\u5b89\u5168\u5167\u5bb9\u7ba1\u7406\u4ee5\u53ca\u5b89\u5168\u5e33\u6236\u7ba1\u7406\u7b49\u3002**\u6b32\u77ad\u89e3\u66f4\u591a\u8cc7\u8a0a\u8acb\u8a2a\u554f\u539f\u6587\u4f86\u6e90\uff1a\u9999\u6e2f\u7d93\u6fdf\u65e5\u5831 &#8211; \u6578\u78bc\u986f\u793a\u5c4f\u6f5b\u5728\u98a8\u96aa\u589e ** \u7d50\u8ad6 \u7db2\u7d61\u5b89\u5168\u554f\u984c\u5728\u7576\u4eca\u6578\u5b57\u5316\u6642\u4ee3\u5df2\u7d93\u6210\u70ba\u4e0d\u5bb9\u5ffd\u8996\u7684\u6311\u6230\u3002\u96a8\u8457\u7db2\u7d61\u653b\u64ca\u624b\u6bb5\u7684\u65e5\u76ca<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5303","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/posts\/5303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/comments?post=5303"}],"version-history":[{"count":4,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/posts\/5303\/revisions"}],"predecessor-version":[{"id":5308,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/posts\/5303\/revisions\/5308"}],"wp:attachment":[{"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/media?parent=5303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/categories?post=5303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edon.asia\/en\/wp-json\/wp\/v2\/tags?post=5303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}