Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce

Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce

When Covid-19 prompted lockdowns around the world last year, most businesses made the impromptu decision to safeguard employees and allow them to work from home (WFH). Most companies acted efficiently in making this abrupt transition to a new remote working model led by WFH.

Forbes January 18, 2021
Cybersecurity: Same Threats, New Challenges

Cybersecurity: Same Threats, New Challenges

For business leaders, 2020 was many things. A test. A catalyst. An opportunity.

For chief information security officers (CISOs), it was all of these things at once—with the security of the business hanging in the balance. This was especially true when it came to the rapid shift to remote work.

Forbes January 18, 2021
WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update

WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update

WhatsApp, the world’s leading messenger with 2 billion users sending 100 billion messages each day, popularized secure messaging. But if you’re one of the hundreds of millions using WhatsApp on an iPhone, you’re in for an unwelcome surprise when you see Apple’s stunning new iMessage update.

Forbes January 5, 2021
The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup.

Forbes December 20, 2020
Revealed: How The EU Funds Global iPhone And Facebook Surveillance

Revealed: How The EU Funds Global iPhone And Facebook Surveillance

Police across the world are getting special training from a little-known European Union agency on how best to snoop on Facebook and Apple iPhones, according to documents obtained by nonprofit Privacy International.

Forbes December 9, 2020
All Tricks And No Treat: Preparing For IT Chaos In 2021

All Tricks And No Treat: Preparing For IT Chaos In 2021

The tech industry is filled with shock statements about the unexpected sea of spooky threats just around the corner and how to prepare for them. But disaster recovery, backup, and resiliency are not the glitziest subjects when times are stable.

Forbes November 18, 2020
Development of anti-phishing browser based on random forest and rule of extraction framework

Development of anti-phishing browser based on random forest and rule of extraction framework

Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information, such as login credentials and credit and debit card information, etc. It is carried out by a person masquerading as an authentic individual.

SpringerOpen November 18, 2020
Is Your Boardroom The Weakest Cybersecurity Link?

Is Your Boardroom The Weakest Cybersecurity Link?

From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.

Forbes October 8, 2020
China tightens tech export controls potentially jeopardizing TikTok deal, reports say

China tightens tech export controls potentially jeopardizing TikTok deal, reports say

According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.

CNBC October 8, 2020
What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.

Forbes October 8, 2020
India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.

Forbes October 8, 2020
Protecting the home network is a new challenge and a new reality, says cybersecurity exec

Protecting the home network is a new challenge and a new reality, says cybersecurity exec

RSA Security President Rohit Ghai explains how the cheese has moved for his business from protecting the office to protecting the home.

CNBC October 8, 2020
Why Google And YouTube Are Now China’s Most Wanted

Why Google And YouTube Are Now China’s Most Wanted

“Without any solid evidence,” a Chinese government spokesperson complained last week, “some people in the U.S. have been abusing the concept of national security to suppress non-American enterprises. These U.S. moves are utterly disgraceful.” You can use Google to find those comments on the ongoing TikTok pantomime if you like—they’re online.

Forbes October 8, 2020
How Hackers Use Sound To Unlock The Secrets Of Your Front Door Key

How Hackers Use Sound To Unlock The Secrets Of Your Front Door Key

When thinking about physical security in the cyber realm, the mind, more often than not, turns to the risks posed by so-called smart locks. When I recently asked 549 security professionals if they would use a smart lock, 400 of them said no, get in the sea.

Forbes October 8, 2020
Has Trump Suddenly Ended Huawei’s Smartphone Business?

Has Trump Suddenly Ended Huawei’s Smartphone Business?

The battle between the Trump administration and Chinese tech company Huawei has escalated materially this week—and while the implications have not yet been fully assessed, this looks like it could be the game-changer.

Forbes October 8, 2020
Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’

Malicious Chinese SDK In 1,200 iOS Apps With Billions Of Installs Causing ‘Major Privacy Concerns To Hundreds Of Millions Of Consumers’

A Chinese ad network named Mintegral is accused of spying on user activity and committing ad fraud in more than 1,200 apps with 300 million installs per month since July 2019. Mintegral is headquartered in Beijing, China, and is owned by another Chinese ad network, Mobvista, which has a head office in Guangzhou, China.

Forbes October 8, 2020

By continuing to use the site, you agree to the use of cookies. We use cookies and may also make use of your personal data in order to enhance your experience. By using this site you agree to our Privacy Policy. Please take the necessary time to read and understand its contents. Read More

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close