Sign in

Zen Chan

Cybersecurity | Technology

It’s Time To Protect Yourself; Even You Have Nothing To Hide

How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
Image by Tony Webster from Wikimedia | Creative Commons

A while back, I met an old friend who I hadn’t seen since I graduated. We went for a cup of coffee to catch up for the past decades. He told me he was watching “Breaking Bad” in season 2. And we both love Breaking Bad (Who didn't?) I also recommended him to try Westworld as “Jessie Pinkman” was in last season.


From top stories to practical guides

List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
“Miracles do happen” in Central, Hong Kong | Copyright by the author

I wrote on Medium in November 2019. I still remember the first story was written at the Suvarnabhumi Airport (BKK) in Thailand. I typed on my Pixel 2XL, using the on-screen keyboard when I was waiting for my girlfriend's arrival.

Not many people use Medium in Hong Kong, but I like reading on medium. Since the last US election, I gave up Facebook. Unlike Facebook, I post on Medium to share what I learned and enjoyed. Before I realized it, my English improved! (I know it still sucks).

When preparing my presentation, the flow and the arrangement of contents secretly…


What I learned after becoming an ISSAP®

The ONE thing that makes a Great Cybersecurity Professional What I learned after becoming an ISSAP®
The ONE thing that makes a Great Cybersecurity Professional What I learned after becoming an ISSAP®
Photo by Hunters Race on Unsplash

I Passed!

I just passed the exam of ISSAP® — Information Systems Security Architecture Professional from (ISC)2®. It was one of the most challenging exams I took in my life. All the answers to the multiple choices are correct, but it is required to choose the best answer in most cases. I checked the member count from the official website. There are 25 active holders in Hong Kong and 2061 worldwide.


Cybersecurity | Technology

New Phishing Techniques Explained and How to Avoid Falling for it

Image by Tumisu from Pixabay.com

Here is my addition to extend the topic:

Most of us will not click on the email claiming we are a lottery winner nowadays. However, phishing attacks evolved and remained the most dangerous cyberattack for individuals or enterprises since the first phishing attack in 1995.

According to a report by email security company Valimail, over three billion spoofing messages are sent each day, nearly 1% of all email traffic. And this is costing quite costly damage to our society. …


Privacy | Technology

If Someone Steals Your Phone Number, They Become You.

Photo by Markus Winkler form PxHere

Assuming you read my previous article and learned how to limit your exposure online. You set up a password manager and enabled multi-factor authentication for your accounts. There is more to be done to keep you safe. You might think your ID number or bank account numbers are the most sensitive digits. Sadly, with only your cell phone number, hackers can do far more damage with little effort.


Privacy | Technology

Take Back Control of Your Data in Mobile Devices

Image by Book Catalog from Flickr | (CC BY 2.0)

Unlike what we did in the past, we need a computer to be the digital self, most people spend most of the time online with their mobile nowadays. A few years ago, if you want to protect privacy with apps, you do not have much choice. But now, multiple options are available and so of them are also open-source and free of charge.

This time, I would focus on 5 areas for people to start with:

  • Authenticator Apps
  • Privacy-Focused Browser
  • Password Manager
  • Encrypted Messager
  • Device Location Tracker

At the beginner level, let’s try them yourself and share them with people…


Privacy | Cybersecurity

Collection of Privacy-focused Stories

Photo by Mohamed Hassan from PxHere

Facebook’s Ireland data supervisor (Helen Dixon) in the EU has opened an investigation into whether Facebook violated data protection rules regarding the leak of data reported earlier this month.

Again, the tech giant did not provide a statement afterward. Even if they did, I am sure there would be nothing pleased. On Monday, the EU Commission intervened. They pressured Ireland’s data protection commissioner on this case, according to the tweet of Justice commissioner of the EU, Didier Reynders:

There would not be a solution soon. Next would possibly be the repeating and useless PR stunt from Facebook and, if…


Privacy | Cybersecurity

Another Wake-up Call for Re-thinking Privacy and Social Media Platform.

Edited from AppStore Images by the author

Facebook, Linkedin, Clubhouse

Since the invite-only and audio-only social media app launch in March 2020, Clubhouse became popular and attracted millions of users. Users enjoy the audio community with various topics in “rooms.”

I talked about the privacy and security risk of the app in February. If you still remember, Elon Musk helped Clubhouse leap during the frenzy of Gamestop, Wallstreetsbets, and Dogecoin. While the risks are still valid and not fixed, the personal data of 1.3 million Clubhouse users has been posted online on a popular hacker forum, according to a Saturday report from Cyber News.

The scraped data of Clubhouse users…


Cybersecurity | Privacy

Explanation of Something You May Not Aware About Facebook Like “Off-Facebook Activity” and “Shadow Profile”

Image edited by the author

One thing that steals my focus of this “Facebook Leak” is that no one contacted you about the hack or telling you what to do, unlike other companies. Therefore, instead of apologizing for failing to keep our data safe, Facebook’s product management director Mike Clark began his blog post by:

“It is important to understand that malicious actors obtained this data not through hacking our systems but by scraping it from our platform prior to September 2019,”

A few days later, after I shared…


Privacy | Cybersecurity

Understanding the Value of Privacy Via the Facebook Data Leak

Image by Mohamed Hassan from Pixabay

If a researcher conducted a survey asking people how important personal privacy is to them, the vast majority of respondents would reply “very important,” even though those same respondents would probably engage with social media platforms such as Facebook, Instagram, or Twitter within minutes of answering the survey.

This is the problem with the word “privacy” — a very subjective concept among us as different people look into the same problem from a different angle. Digital privacy presents a…

Zen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running. Top Writer in Privacy. Editor of Technology Hits.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store