Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Cyber Security


Category

Cybersecurity researchers build a better 'canary trap'

Cybersecurity researchers build a better 'canary trap'

“The system produces documents that are sufficiently similar to the original to be plausible, but sufficiently different to be incorrect,” said V.S. Subrahmanian, the Distinguished Professor in Cybersecurity, Technology, and Society, and director of the Institute for Security, Technology, and Society.

Tech Xplore March 4, 2021
iOS 14.5: How This Could Be Apple’s Most Stunning iPhone Update Yet

iOS 14.5: How This Could Be Apple’s Most Stunning iPhone Update Yet

Apple’s iOS 14.5 is set to launch very soon, with a bunch of really cool new features for your iPhone. As new iOS 14.5 features continue to be revealed via the beta release, it looks likely that this could be Apple’s most stunning iOS 14 update yet for those who care about security and privacy.

Forbes February 16, 2021
Don’t Lose Your WhatsApp For 7 Days - Change This Critical Setting Now

Don’t Lose Your WhatsApp For 7 Days - Change This Critical Setting Now

If you’re one of WhatsApp’s 2 billion users, you’re likely concerned about recent headlines warning that your data is being harvested and shared with Facebook. But there’s a much more serious risk for you to worry about—one which is getting worse. Here’s what you must do to ensure you don’t lose your account for at least 7 days.

Forbes February 16, 2021
Future Focused: The 2021 Cybersecurity Landscape

Future Focused: The 2021 Cybersecurity Landscape

2020 was a year of challenges. The onset of Covid-19 necessitated a work-from-home environment on an unprecedented scale.

Forbes February 2, 2021
Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce

Bolstering Risk And Cybersecurity Strategy Safeguards The Remote Workforce

When Covid-19 prompted lockdowns around the world last year, most businesses made the impromptu decision to safeguard employees and allow them to work from home (WFH). Most companies acted efficiently in making this abrupt transition to a new remote working model led by WFH.

Forbes January 18, 2021
Cybersecurity: Same Threats, New Challenges

Cybersecurity: Same Threats, New Challenges

For business leaders, 2020 was many things. A test. A catalyst. An opportunity.

For chief information security officers (CISOs), it was all of these things at once—with the security of the business hanging in the balance. This was especially true when it came to the rapid shift to remote work.

Forbes January 18, 2021
WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update

WhatsApp Soundly Beaten By Apple’s Stunning New iMessage Update

WhatsApp, the world’s leading messenger with 2 billion users sending 100 billion messages each day, popularized secure messaging. But if you’re one of the hundreds of millions using WhatsApp on an iPhone, you’re in for an unwelcome surprise when you see Apple’s stunning new iMessage update.

Forbes January 5, 2021
The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase

Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup.

Forbes December 20, 2020
Revealed: How The EU Funds Global iPhone And Facebook Surveillance

Revealed: How The EU Funds Global iPhone And Facebook Surveillance

Police across the world are getting special training from a little-known European Union agency on how best to snoop on Facebook and Apple iPhones, according to documents obtained by nonprofit Privacy International.

Forbes December 9, 2020
All Tricks And No Treat: Preparing For IT Chaos In 2021

All Tricks And No Treat: Preparing For IT Chaos In 2021

The tech industry is filled with shock statements about the unexpected sea of spooky threats just around the corner and how to prepare for them. But disaster recovery, backup, and resiliency are not the glitziest subjects when times are stable.

Forbes November 18, 2020
Development of anti-phishing browser based on random forest and rule of extraction framework

Development of anti-phishing browser based on random forest and rule of extraction framework

Phishing is a technique under Social Engineering attacks which is most widely used to get user sensitive information, such as login credentials and credit and debit card information, etc. It is carried out by a person masquerading as an authentic individual.

SpringerOpen November 18, 2020
Is Your Boardroom The Weakest Cybersecurity Link?

Is Your Boardroom The Weakest Cybersecurity Link?

From phishing to ransomware, one of the primary challenges with effective cybersecurity risk management is related to the weakest link theory. The essence of this theory is the phrase “a chain is no stronger than its weakest link.” This idiom reflects the fact that effective cybersecurity risk management is a complex system of related and inter-dependent parts. If one component fails, it can jeopardize the entire system.

Forbes October 8, 2020
China tightens tech export controls potentially jeopardizing TikTok deal, reports say

China tightens tech export controls potentially jeopardizing TikTok deal, reports say

According to the reports, China updated its export control rules to incorporate technology that could include TikTok, a claim later reasserted by commentary published in China’s state-controlled Xinhua news agency on Saturday.

CNBC October 8, 2020
What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

What’s New In Gartner’s Hype Cycle For Endpoint Security, 2020

These and many other new insights are from Gartner Hype Cycle for Endpoint Security, 2020 published earlier this year and the recent announcement, Gartner Says Bring Your Own PC Security Will Transform Businesses within the Next Five Years. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here.

Forbes October 8, 2020
India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs tools, technology and experts to protect cybersecurity assets: Tech Mahindra

India needs an army of cybersecurity experts, tools and technology to protect its assets against malicious attackers as data becomes a pervasive “lifeline” for countries, says C. P. Gurnani, CEO and managing director of Tech Mahindra.

Forbes October 8, 2020