As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Google have recently issued security vulnerability about Chrome browser. This vulnerability is widely exploited.
Please update to Google Chrome version 137.0.7151.68 or later
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its June security update notice, there are 69 vulnerability updates this time.
The updates this time mainly cover the following components: .NET and Visual Studio, Windows Common Log File System Driver, Windows Cryptographic Services, Windows DHCP Server, Windows KDC Proxy Service (KPSSVC), Windows DWM Core Library, Windows Local Security Authority Subsystem Service (LSASS) products vulnerabilities.
Details of the vulnerabilities:
Web Distributed Authoring and Versioning (WEBDAV) Remote Code Execution Vulnerability
此次釋出的更新主要涵蓋了以下組件: .NET and Visual Studio, Windows Common Log File System Driver, Windows Cryptographic Services, Windows DHCP Server, Windows KDC Proxy Service (KPSSVC), Windows DWM Core Library, Windows Local Security Authority Subsystem Service (LSASS) 等產品的漏洞。
Deepfakes refer to audio or video content that has been digitally manipulated using AI (Artificial Intelligence) deep learning to convincingly imitate a person’s face, voice, or behavior. While this technology has legitimate applications, it is increasingly being exploited by scammers to impersonate individuals—such as corporate executives during video calls—to deceive others and commit fraud. These scams can lead to financial loss, reputational damage, or misinformation, and similar cases have already occurred in Macau.
5 Tips to Protect Yourself from Deepfake Scams:
Stay Alert:
Always be cautious of videos and audio you receive online. Seeing is not believing. Treat unexpected or suspicious content with skepticism.
Verify Through Multiple Sources:
Check if the information is reported by other reliable sources, such as official channels or reputable news outlets. If it comes from only one source, it may be fabricated.
Watch for Irregularities:
Even though deepfakes are becoming more realistic, there are still telltale signs.
Facial expressions or lip-syncing that don’t match the audio
Unnatural movements or gestures
Unusual voice pitch or inconsistent tone
Skin tone or lighting that looks off or unnatural
These can all indicate manipulated media.
Be Extra Cautious with Money Requests:
If you receive urgent instructions to transfer money—especially from a supposed boss or family member—pause and verify their identity directly, preferably through another channel like a phone call.
Hang up on unknown video/voice invitations:
If you receive a call or video conference invitation from an unknown number, especially if the caller claims an identity but you can’t immediately verify it, hang up immediately to avoid falling into a Deepfake scam. If the person continues to harass you or makes you feel uncomfortable, consider blocking that number/user account to protect yourself.
Deepfake technology poses real threats, but with awareness and careful verification, you can protect yourself. If you suspect you’ve encountered a deepfake scam, report it to the police or seek assistance immediately.
Should you have any enquiries, please feel free to contact ICTO HelpDesk.
Recently, some university members reported that someone is using external email addresses to impersonate them and send messages to students and other members of UM community. Please be vigilant and protect yourself from these scams!
Kindly note the following:
Watch Out for Emails sending from Outside of the University: Check carefully the sender’s email address, especially if it comes from a domain other than UM (e.g., outlook.com, gmail.com.). Scammers often use email names similar to those of UM members, but with a different domain. You may look out for emails with “External Email Warning Tag”:
Use University Email Whenever Possible: When communicating with professors, students, or administrative staff within UM, please use the official UM email address (@um.edu.mo, @connect.um.edu.mo)whenever possible.
Verify Suspicious Emails: If you receive a suspicious email, pleaseverify its authenticitywith the sender by phone or in person.
Report Losses Immediately: If you suffer financial or other losses due to this fraud, please report it to the judicial police immediately.
Protect Your Personal Information: Do not click unknown links or download suspicious attachments, to avoid revealing sensitive personal information.
Report Suspicious Activity:If you discover any suspicious emails or fraudulent activity, please contact the ICTO Help Desk immediately.
Thank you for your cooperation in maintaining a secure campus network!
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its May security update notice, there are 78 vulnerability updates this time.
The updates this time mainly cover the following components: Windows Routing and Remote Access Service (RRAS), Windows Virtual Machine Bus, Windows Installer, Windows Drivers, Windows File Server, Azure, Windows Win32K – GRFX, Microsoft Scripting Engine products vulnerabilities.
Details of the vulnerabilities:
Windows Scripting Engine Memory Corruption Vulnerability
此次釋出的更新主要涵蓋了以下組件: Windows Routing and Remote Access Service (RRAS), Windows Virtual Machine Bus, Windows Installer, Windows Drivers, Windows File Server, Azure, Windows Win32K – GRFX, Microsoft Scripting Engine 等產品的漏洞。
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Google have recently issued a zero-day security vulnerability about Chrome browser. This vulnerability is widely exploited.
Please update to Google Chrome version 134.0.6998.177 or later
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its April security update notice, there are 126 vulnerability updates this time.
The updates this time mainly cover the following components: Windows Hyper-V, Remote Desktop Gateway Service, Windows Routing and Remote Access Service (RRAS), Windows Common Log File System Driver, Windows TCP/IP, Visual Studio, Windows Active Directory Certificate Services, Windows Kerberos, Windows Kernel products vulnerabilities.
Details of the vulnerabilities:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
此次釋出的更新主要涵蓋了以下組件: Windows Hyper-V, Remote Desktop Gateway Service, Windows Routing and Remote Access Service (RRAS), Windows Common Log File System Driver, Windows TCP/IP, Visual Studio, Windows Active Directory Certificate Services, Windows Kerberos, Windows Kernel 等產品的漏洞。
In today’s digital world, our online accounts hold a vast amount of personal and professional information. Protecting this information is crucial, and one of the most effective methods is to use passwords with reasonable length and complexity. This approach can increase the difficulty for hackers to crack your passwords. In general standard, passwords are recommended to have at least 8 characters long, preferably 15 characters, and consider including uppercase and lowercase letters, numbers, and special characters.
Tips for Setting Passwords:
Set Strong Passwords:
Passwords should have a specific length and complexity, or use long, easy-to-remember passphrases that are difficult for others to guess.
Avoid Using Personal Information:
Do not use information that is easy for others to guess, such as your name, birthdate, pet’s name, or common words.
Avoid Reusing Passwords:
Do not reuse the same password across multiple accounts. If one account is compromised, all other accounts using the same username and password are at risk.
Enable Two-Factor Authentication (2FA):
Whenever possible, enable 2FA service to add an extra layer of security.
Regularly Check Account and Password Safety:
It is recommended to regularly check the safety of your accounts and passwords, and change them promptly if you suspect they have been compromised.
By following these tips and developing the habit of using passwords with reasonable length and complexity, you can protect the security of your accounts and information.
Should you have any enquiries, please feel free to contact ICTO HelpDesk.
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Microsoft have recently released its March security update notice, there are 56 vulnerability updates this time.
The updates this time mainly cover the following components: Windows and Windows Components, Office and Office Components, Azure, .NET and Visual Studio, Remote Desktop Services, DNS Server, and Hyper-V Server products vulnerabilities.
Details of the vulnerabilities:
Microsoft Management Console Security Feature Bypass Vulnerability
此次釋出的更新主要涵蓋了以下組件:Windows and Windows Components, Office and Office Components, Azure, .NET and Visual Studio, Remote Desktop Services, DNS Server, Hyper-V Server 等產品的漏洞。