UDialogue - Mar 2016
立即讚好 Facebook Fan Page!
Some clients sent us inquiry emails that while using Outlook, all emails set to remain as a copy in the system suddenly disappeared for good.

Our expert colleagues checked UDomain’s server system at once, and it was found normal. After further investigations, we realized that there was a “Leap Year Bug” in Outlook 2016 when using POP3 to download emails. Calculation would go wrong if the reserved period covers 29 February 2016, deleting clients emails from server once downloaded.
 

We suggested our clients to leave the “Remove from server after ___ days” box unabled, you may also see Microsoft’s solution as a reference.

UDomain would continue to follow up the issue, and should there be any inquiries, please fill in the form below or call us at (852) 2554 7545.

Company :
Contact Person :
Tel/Mobile :
Email :
Captcha: CAPTCHA Image
 
Last month before the Chinese New Year, a financial website client kept pointing his domain name to different IP addresses every day. UDomain noticed this abnormal behavior and took initiatives to understand his situation:
His website suffered a mild cyber-attack and received the hacker’s email, demanding a ransom of “10 Bitcoin (approximately HK$30,000) for a once-and-for-all settlement”; otherwise, a full-scale attack would be launched in the Chinese New Year, and would predictably destroy the database in 3 days.
 

UDomain immediately changed the website’s name server for better protection. The hacker followed this lead and sent an email to client and us directly, stating he/she was all prepared to take down the site. Our experts further discussed with the client, all data was transferred to a safe location at the end, and the attack was avoided.

In fact, similar cyber blackmailing cases are happening all over the world (especially in Europe, US and China). This rampant trend targets SMEs’ websites, and even public sectors, banks and trading exchange centers. A question always remains: If one agrees to a hacker’s demand, will it draws another round of attack, or attacks from other hackers? Corporations can think twice before act.

For inquiries, please fill in the form below or call us at (852) 2554 7545.
 
Company :
Contact Person :
Tel/Mobile :
Email :
Captcha: CAPTCHA Image