Zen Chan

Cybersecurity | Technology

It’s Time To Protect Yourself; Even You Have Nothing To Hide

How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
How To Be Anonymous Online. It’s Time To Take Back Our Control on… | by Zen Chan | Medium
Image by Tony Webster from Wikimedia | Creative Commons


From top stories to practical guides

List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
List of Zen’s InforSec on Medium and Thank you. | by ZEN CHAN | Dec, 2020 | Medium
“Miracles do happen” in Central, Hong Kong | Copyright by the author


What I learned after becoming an ISSAP®

The ONE thing that makes a Great Cybersecurity Professional What I learned after becoming an ISSAP®
The ONE thing that makes a Great Cybersecurity Professional What I learned after becoming an ISSAP®
Photo by Hunters Race on Unsplash

I Passed!


Cybersecurity | Career

No Problem Can Be Solved Unless the Mindset Is Exact

Difference Between Engineering and Security Mindsets | by Zen Chan | Medium
Difference Between Engineering and Security Mindsets | by Zen Chan | Medium
Image by NakNakNak from Pixabay


Cybersecurity

And How to Prepare for the Next One

The Rise of Zero-Day Vulnerability | by Zen Chan | Medium
The Rise of Zero-Day Vulnerability | by Zen Chan | Medium
Image by Clker-Free-Vector-Images from Pixabay


Cybersecurity

Useful Tool to Find the Weakness of Your Enemy

Introduction of Malvuln Project. Useful Tool to Find the Weakness of… | by Zen Chan | Medium
Introduction of Malvuln Project. Useful Tool to Find the Weakness of… | by Zen Chan | Medium
Image by PublicDomainPictures from pixabay.com

Introduction


Privacy | Cybersecurity

Recent Research Confirmed the Data Exposure to China via Agora Inc.

Clubhouse Security Risk Follow-up: China Is Listening | by Zen Chan | Medium
Clubhouse Security Risk Follow-up: China Is Listening | by Zen Chan | Medium
Edited from AppStore Images by the author


Cybersecurity

Introduction of The Most Recent Attempts and A “Real” One As Valuable Lessons In Cybersecurity

Why The Watering Hole Attacks Raise Security Concerns | by Zen Chan | Medium
Why The Watering Hole Attacks Raise Security Concerns | by Zen Chan | Medium
Image by Shafin Al Asad Protic from Pixabay

The Most Recent Watering Hole Attacks


The Journey From My First Article to the First 10K Views

What I Learned From Writing at Technology Hits | by Zen Chan | Medium
What I Learned From Writing at Technology Hits | by Zen Chan | Medium
Thank you, everyone, for all the claps and responses! | Copyright by the author.

The Beginning


Cybersecurity | Technology

Why “Free” Is The Most Expensive Price and What is “Zero-Knowledge Proof”

How To Be Anonymous Online — Part II | by Zen Chan | Medium
How To Be Anonymous Online — Part II | by Zen Chan | Medium
Image by Johnny Silvercloud from Flickr | CC2.0

Recap from Part I:

Zen Chan

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running. Top Writer in Privacy. Editor of Technology Hits.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store