If you want to protect your computer facilities and smart devices from cyber threats, please download relevant tools via the links below.
Tools for Digital Devices
Suspicious Email Detection System (V@nguard)
The Cyber Security and Technology Crime Bureau (CSTCB) of the Hong Kong Police Force joined hands with the University of the Hong Kong (HKU), and the government departments and organisations that support local small and medium-sized enterprises (SMEs), to promote an anti-email scam project named e-GUARD to the business sector through a multi-agency approach. Under Project e-GUARD, a Suspicious Email Detection System named V@nguard, is co-developed by CSTCB and HKU to assist SMEs in automatically detecting suspicious emails in their daily business communications and protecting them from email scams. Currently, V@nguard only operates on email server running on Linux operating system.
V@nguard is officially launched and available for free download now. If you have any enquiries, please contact us by phone 2860 2913 or email [email protected].
Introduction and installation demo videos (Chinese version only)
Scanning and Cleaning tools:
Together with the following software companies, we offer free scanning and cleaning tools.
Smart Device Applications
If you want to protect your computer facilities and smart devices from cyber threats, please download relevant tools via the links below.
Network Security Tool
You may be interested in
A Vulnerability Disclosure Program (VDP) is a process by which an organization invites external security researchers to report vulnerabilities in…
Suspected Scam / Cyber Pitfall? Check it out with “Scameter”! Please Select Type Platform Username Platform ID Phone Email URL…
Recovery phrase is a list of words randomly generated by your crypto wallet (e.g. MetaMask) during initial account setup. Recovery…
How to set up a Firewall A firewall helps defend against cyber attacks and data breaches through shielding computer or…
A number of experts believe that spreading of virus and malware are rather difficult under iOS for the closed system…
You may have received new mobile phone as a present. After excitingly transferring data to your new mobile How to…
Cyber Security and Technology Crime Bureau, initiated a new wave of cyber hygiene operation to improve online security, maintain system…
Free Wi-Fi is provided in public places such as government public facilities, shopping malls Free Public Wi-Fi Free Wi-Fi is…
Social media and instant messaging software have become essential tools for our daily social interaction Security of Social Media Account…
Multi-Factor Authentication (MFA) is to use two or more factors to authenticate Multi-Factor Authentication and Biometric Authentication Importance of Multi-Factor…
In late 2022, a virtual private network service provider published a list of the most commonly used passwords, “password” topped…