Zen Chan

Cybersecurity | Technology

Why It is More Like a Mindset Than An Architecture

Zero Trust Is a Concept, Not A Product Part I- Introduction to Zero Trust Security Architecture… | by Zen Chan | Technology Hits | Medium
Image by mohamed_hassan from pixabay.com

The concept of "Zero Trust" has been around for years. Unfortunately, this concept becomes a cybersecurity catchphrase with cyberattacks like spear-phishing, ransomware, and business email compromise (BEC) at all-time highs. Even the notoriously slow government cybersecurity planning is going all-in on this matter.

However, a crucial obstacle to widely adopting…

Cybersecurity | Technology

Why “Free” Is The Most Expensive Price and What is “Zero-Knowledge Proof”

How To Be Anonymous Online — Part II | by Zen Chan | Medium
Image by Johnny Silvercloud from Flickr | CC2.0

“Real integrity is doing the right thing, knowing that nobody’s going to know whether you did it or not.”
― Oprah Winfrey

After I published Part I of “How To Be Anonymous Online,” apart from people saying, “I have nothing to hide!” people strive to protect their data. …

Cybersecurity | Technology

It’s Time To Protect Yourself; Even You Have Nothing To Hide

How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
Image by Tony Webster from Wikimedia | Creative Commons

“All human beings have three lives: public, private, and secret.” ― Gabriel García Márquez

A while back, I met an old friend who I hadn’t seen since I graduated. We went for a cup of coffee to catch up for the past decades. He told me he was watching “Breaking…

From top stories to practical guides

List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
“Miracles do happen” in Central, Hong Kong | Copyright by the author

I wrote on Medium in November 2019. I still remember the first story was written at the Suvarnabhumi Airport (BKK) in Thailand. I typed on my Pixel 2XL, using the on-screen keyboard when I was waiting for my girlfriend's arrival.

Not many people use Medium in Hong Kong, but I…

Cybersecurity | Trends

Supply Chains Attacks, Ransomware, Clouds, Zero Trust, and More Challenges

Edited Image by Deepak pal from Flickr (CC BY 2.0)

Since the White House issued an Executive Order on Cybersecurity in May 2021 to send a clear message about the government's priorities, Cybersecurity has become the main character again. The main goal is to create a nationwide commitment to enforcing Cybersecurity best practices.

The reason behind this message is the…

Technology | Cybersecurity

The Flaw Could Allow Attackers to Bypass Privacy Preferences, Giving Apps With No Right to Access Files, Microphones, or Cameras the Ability to Record You or Grab Screenshots

Image by Dan Nguyen from Flickr | (CC BY-NC 2.0)

Microsoft last week released an advisory about a bug in macOS that Apple fixed the previous month — dubbed "powerdir" — that could let attackers hijack apps, install their malicious apps, use the microphone to eavesdrop or grab screenshots of your screen.

According to the Microsoft 365 Defender Research Team

Cybersecurity | Technology

2021 is the Year of Ransomware, So What's Next?

Ransomware Evolution: From WannaCry to DarkSide | by Zen Chan | Medium
Image by Christiaan Colen from Flickr

2021 is coming to an end. And for cybersecurity, this is a busy year (which wasn't?). Ransomware attacks are steep upward, and the gradient isn't softening its progression. Individuals and organizations continue to fall victim to this age-old cybercrime — and it's far from a new phenomenon.

If you are…

Cybersecurity | Technology

Why Today's Cybersecurity Threats Are More Threatening and How They May Differ From the Hurdles We Met in the Past

0-Day Log4Shell Is Serious, But It’s Just the Tip of The Iceberg | by Zen Chan | Technology Hits | Dec, 2021 | Medium
Image by the author

“If an attacker was able to infiltrate a popular library like log4j, they would very quickly be running with privilege inside most data centers in the world.”

— Jeff Williams, Contrast Security (2018)

Over the past two years, the rise of ransomware that goes It's the Tip of The Iceberg…

Zen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running. Top Writer in Privacy. Editor of Technology Hits.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store