To prevent your passwords from being hacked by social engineering, brute force or dictionary attack method, and keep your online accounts safe, you should notice that:

1. Do not use the same password, security question and answer for multiple important accounts.

2. Use a password that has at least 16 characters, use at least one number, one uppercase letter, one lowercase letter and one special symbol.

3. Do not use the names of your families, friends or pets in your passwords.

4. Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers, social security numbers, and so on in your passwords.

5. Do not use any dictionary word in your passwords.

6. Do not use two or more similar passwords which most of their characters are same, for example, ilovefreshflowersMac, ilovefreshflowersDropBox, since if one of these passwords is stolen, then it means that all of these passwords are stolen.

7. Do not use something that can be cloned( but you can't change ) as your passwords, such as your fingerprints.

8. Do not let your Web browsers( FireFox, Chrome, Safari, Opera, IE ) store your passwords, since all passwords saved in Web browsers can be revealed easily.

9. Do not log in to important accounts on the computers of others, or when connected to a public Wi-Fi hotspot, Tor, free VPN or web proxy.

10. Do not send sensitive information online via unencrypted( e.g. HTTP or FTP ) connections, because messages in these connections can be sniffed with very little effort. You should use encrypted connections such as HTTPS, SFTP, FTPS, SMTPS, IPSec whenever possible.

11. When traveling, you can encrypt your Internet connections before they leave your laptop, tablet, mobile phone or router. For example, you can set up a private VPN( with MS-CHAP v2 or stronger protocols ) on your own server( home computer, dedicated server or VPS ) and connect to it. Alternatively, you can set up an encrypted SSH tunnel between your router and your home computer( or a remote server of your own ) with PuTTY and connect your programs( e.g. FireFox ) to PuTTY. Then even if somebody captures your data as it is transmitted between your device( e.g. laptop, iPhone, iPad ) and your server with a packet sniffer, they'll won't be able to steal your data and passwords from the encrypted streaming data.

12. How secure is my password? Perhaps you believe that your passwords are very strong, difficult to hack. But if a hacker has stolen your username and the MD5 hash value of your password from a company's server, and the rainbow table of the hacker contains this MD5 hash, then your password will be cracked quickly.

     To check the strength of your passwords and know whether they're inside the popular rainbow tables, you can convert your passwords to MD5 hashes on a MD5 hash generator, then decrypt your passwords by submitting these hashes to an online MD5 decryption service. For instance, your password is "0123456789A", using the brute-force method, it may take a computer almost one year to crack your password, but if you decrypt it by submitting its MD5 hash( C8E7279CD035B23BB9C0F1F954DFF5B3 ) to a MD5 decryption website, how long will it take to crack it? You can perform the test yourself.

13. It's recommended to change your passwords every 10 weeks.

14. It's recommended that you remember a few master passwords, store other passwords in a plain text file and encrypt this file with 7-Zip, GPG or a disk encryption software such as BitLocker, or manage your passwords with a password management software.

15. Encrypt and backup your passwords to different locations, then if you lost access to your computer or account, you can retrieve your passwords back quickly.

16. Turn on 2-step authentication whenever possible.

17. Do not store your critical passwords in the cloud.

18. Access important websites( e.g. Paypal ) from bookmarks directly, otherwise please check its domain name carefully, it's a good idea to check the popularity of a website with Alexa toolbar to ensure that it's not a phishing site before entering your password.

19. Protect your computer with firewall and antivirus software, block all incoming connections and all unnecessary outgoing connections with the firewall. Download software from reputable sites only, and verify the MD5 / SHA1 / SHA256 checksum or GPG signature of the installation package whenever possible.

20. Keep the operating systems( e.g. Windows 7, Windows 10, Mac OS X, iOS, Linux ) and Web browsers( e.g. FireFox, Chrome, IE, Microsoft Edge ) of your devices( e.g. Windows PC, Mac PC, iPhone, iPad, Android tablet ) up-to-date by installing the latest security update.

21. If there are important files on your computer, and it can be accessed by others, check if there are hardware keyloggers( e.g. wireless keyboard sniffer ), software keyloggers and hidden cameras when you feel it's necessary.

22. If there are WIFI routers in your home, then it's possible to know the passwords you typed( in your neighbor's house ) by detecting the gestures of your fingers and hands, since the WIFI signal they received will change when you move your fingers and hands. You can use an on-screen keyboard to type your passwords in such cases, it would be more secure if this virtual keyboard( or soft keyboard ) changes layouts every time.

23. Lock your computer and mobile phone when you leave them.

24. Encrypt the entire hard drive with LUKS or similar tools before putting important files on it, and destroy the hard drive of your old devices physically if it's necessary.

25. Access important websites in private or incognito mode, or use one Web browser to access important websites, use another one to access other sites. Or access unimportant websites and install new software inside a virtual machine created with VMware, VirtualBox or Parallels.

26. Use at least 3 different email addresses, use the first one to receive emails from important sites and Apps, such as Paypal and Amazon, use the second one to receive emails from unimportant sites and Apps, use the third one( from a different email provider, such as Outlook and GMail ) to receive your password-reset email when the first one( e.g. Yahoo Mail ) is hacked.

27. Use at least 2 differnet phone numbers, do NOT tell others the phone number which you use to receive text messages of the verification codes.

28. Do not click the link in an email or SMS message, do not reset your passwords by clicking them, except that you know these messages are not fake.

29. Do not tell your passwords to anybody in the email.

30. It's possible that one of the software or App you downloaded or updated has been modified by hackers, you can avoid this problem by not installing this software or App at the first time, except that it's published to fix security holes. You can use Web based apps instead, which are more secure and portable.

31. Be careful when using online paste tools and screen capture tools, do not let them to upload your passwords to the cloud.

32. If you're a webmaster, do not store the users passwords, security questions and answers as plain text in the database, you should store the salted ( SHA1, SHA256 or SHA512 )hash values of of these strings instead. It's recommended to generate a unique random salt string for each user. In addition, it's a good idea to log the user's device information( e.g. OS version, screen resolution, etc. ) and save the salted hash values of them, then when he/she try to login with the correct password but his/her device information does NOT match the previous saved one, let this user to verify his/her identity by entering another verification code sent via SMS or email.

33. If you are a software developer, you should publish the update package signed with a private key using GnuPG, and verify the signature of it with the public key published previously.

34. To keep your online business safe, you should register a domain name of your own, and set up an email account with this domain name, then you'll not lose your email account and all your contacts, since your can host your mail server anywhere, your email account can't be disabled by the email provider.

35. If an online shopping site only allows to make payment with credit cards, then you should use a virtual credit card instead.

36. Close your web browser when you leave your computer, otherwise the cookies can be intercepted with a small USB device easily, making it possible to bypass two-step verification and log into your account with stolen cookies on other computers.

37. Distrust and remove bad SSL certificates from your Web browser, otherwise you will NOT be able to ensure the confidentiality and integrity of the HTTPS connections which use these certificates.



Acting Chief, Web & Cyber Security Division, PNP-ITMS
Philippine National Police, Camp Crame, Quezon City
Tel: +63027230401 Loc. 4225
URL: /

The information contained in this communication is intended solely for the use of the individual or entity to whom it is addressed and other parties authorized to receive it. It may contain confidential or legally privileged communication. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution or taking any action in reliance on the contents of this information is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by responding to this e-mail and then immediately delete it from your system. Opinions contained in this e-mail or any of its attachments do not necessarily reflect the opinions of the Philippine National Police.

Macro malware arrived with a bang 21 years ago, and it’s still causing problems.

Concept, the first ever virus to spread by infecting Microsoft Office files, turned the anti-virus world on its head overnight when it was shipped by Microsoft on a CD ROM in August 1995.

Up until then the main thing computer users had to worry about was malware hiding in .EXE or .COM executable files, or in the boot sectors of floppy disks. Now you had to be wary of Word documents too, and the risk was heightened when you recognised that exchanging documents in the office was a much more regular behaviour than sharing executable code.

It didn’t take long for macro viruses to become the most commonly-encountered type of malware on the planet.

It would be nice to think that in the decades since macro malware has disappeared as a threat, but the truth is that the problem remains as Microsoft’s own research reveals. Indeed, Microsoft claims that 98% of Office-targeted threats use macros.

It’s clear that the way forward is to block malicious macros. If you can control the macros you can control the threat.

In March, Microsoft took a positive step in helping enterprises who run Office 2016 block macros from loading in certain high-risk scenarios. And yesterday, Microsoft announced that the feature has also been made available to companies running Office 2013.

Let’s look at a typical attack scenario to see how Office 2016 and Office 2013 can better protect your users.

Imagine one of your users receives an email with a malicious Word document attached. Typically there will be some social engineering at play to trick the user into opening the attachment – in this case the email claims the attachment is an overdue invoice for a recent purchase.

Opening the attachment in Microsoft Word is possible, but because the email has arrived from outside the company the attachment is not inherently trusted. A sandboxed environment known as “Protected view” is used – allowing users to read the document’s contents, but disabling macros and other potentially malicious active content. Editing of the document is also disabled.

This, of course, is not going to faze a determined cybercriminal. They have anticipated that their intended target will be defended by Microsoft Office’s “Protected view” feature, and have incorporated a message into their document to trick users – via social engineering again – to “Enable editing” and thus re-enable any malicious macros they have included in their attack.

In short, the attacker is telling his or her victim to disable Microsoft’s built-in defences, giving free reign for the malware to execute.

It’s all too easy to imagine many users falling for a trick like this.

However, Office 2016 and now Office 2013 provide an additional layer of protection. Enterprise administrators can roll out group policies which forbid users from enabling macros in Word, Excel, or PowerPoint files originating from outside the company – even if they are duped into trying by a cybercriminal’s shenanigans.

Although most people will probably barely notice if Word documents and Powerpoint presentations have their macros disabled, it’s clear that challenges still arise when it comes to Excel spreadsheets – which can frequently contain legitimate macros, and which may be being frequently received by some departments from parties outside the company.

My advice to Office users is that alongside your conventional layered defences, you should enable all of the Protected View options in the Trust Center and turn on Data Execution Prevention (DEP).

Within businesses you should seriously consider applying a group policy to block macros from running in Office files originating from the internet. Details of how to enforce such a setting through group policy is explained on Microsoft’s website.

One of the world's most prolific Android malware instances is still the most prevalent piece of malware more than two years after it first emerged.

The capable trojan known as Ghost Push infects Android up to version five, aka Lollipop, still employed by about 57 per cent of all users.

Attackers injected malicious JavaScript code into e-commerce websites to steal payment card data

Almost 6,000 online shops have been compromised by hackers who added specially crafted code that intercepts and steals payment card details.

We adopt encryption technology when transmitting or saving information in the cyberspace to mitigate the risk of data leakage. However, cyber criminals apply this encryption technology to launch cyber attacks. There is much concern recently on the ransomware spreading rapidly across the globe through emails and compromised websites.

Ransomware is a malicious software that cyber criminals used to encrypt the files stored on the infected computer devices. These encrypted files are like hostage and the victims are required to follow the instructions of this malicious software and pay a ransom to decrypt them.

Security Tips to Effectively Defend Against Ransomware
  1. Backup important data frequently and keep the backup data disconnected from the computer
  2. Refrain from visiting suspicious websites or downloading any files from them
  3. Do not open any suspicious emails or instant messages, as well as the attachments and hyperlinks inside
  4. Check and keep your anti-malware program and signatures are up-to-date
  5. Install the latest patches for software in use

Causes of Infection and Impact

Causes of Infection

  • Open suspicious emails, or attachments and hyperlinks inside
  • Visit websites embedded with malicious programs
  • Download and install software or mobile apps that are embedded with ransomware


  • Files inside the computing device and other connected storage devices are encrypted. These data would be lost unless timely backup is available.

Preventive Measures
  • Backup important data frequently and keep the backup data disconnected from the computer
  • Refrain from visiting suspicious websites or downloading any files from them
  • Do not open any suspicious emails or instant messages, as well as the attachments and hyperlinks inside
  • Check and keep your anti-malware program and signatures are up-to-date
  • Install the latest patches for software in use
  • Disable macros for Microsoft Word, Excel and other office applications by default
  • Enable security features of the system and browser
  • Install software and mobile apps from trusted sources, do not install those apps if suspicious permission rights are required
  • For business operations with a higher risk of exposure to malware infection such as customer enquiry emails handling, a dedicated computer with no network drives and restricted network connectivity to internal network should be used to minimise the impact of infection and the handling staff should keep alert of possible infection