Scroll to top
Tech.mt - Malta Leading Through Innovation
Share

Security in the Digital Economy


Tag

Common Techniques Used by Cyber Criminals

Common Techniques Used by Cyber Criminals

Cybercriminals use many different ways to gain access to computer systems in order to...

Tech.mt December 10, 2021
Episode 21: Eavesdropping

Episode 21: Eavesdropping

Eavesdropping is the act of secretly or stealthily listening to the private conversation or...

Tech.mt December 10, 2021
Episode 20: Identity Theft

Episode 20: Identity Theft

Identity theft is the crime of using someone's personal identifying information such as name,...

Tech.mt December 9, 2021
Episode 19: Fraping

Episode 19: Fraping

A 'Frape' occurs when someone accesses a social media account without permission and performs...

Tech.mt December 7, 2021
Episode 18: Business Email Compromise (CEO) Scams

Episode 18: Business Email Compromise (CEO) Scams

Business Email Compromise (BEC) is an exploit in which an attacker obtains access to...

Tech.mt December 2, 2021
Episode 17: Whaling Attack

Episode 17: Whaling Attack

A Whaling attack is a specific type of phishing attack that targets high-profile employees,...

Tech.mt November 30, 2021
Episode 16: Spear-Phishing

Episode 16: Spear-Phishing

Spear-Phishing is the fraudulent practice of sending emails ostensibly from a known or trusted...

Tech.mt November 25, 2021
Episode 15: Phishing

Episode 15: Phishing

Phishing is a specific form of spoofing which provides a link to a fake...

Tech.mt November 23, 2021
Episode 14: Spoofing

Episode 14: Spoofing

Spoofing victims are typically targeted with a deceptive email which is guised as being...

Tech.mt November 18, 2021
Episode 13: Securing Videoconferencing

Episode 13: Securing Videoconferencing

A video conference typically involves two or more people from different locations who communicate...

Tech.mt November 16, 2021
Episode 12: Securing devices used to access company systems

Episode 12: Securing devices used to access company systems

An endpoint may be any computing device – a server, a desktop or workstation...

Tech.mt November 11, 2021
Episode 11: Managing Insider Threats

Episode 11: Managing Insider Threats

An insider is typically an employee of an organisation that has authorisation to access...

Tech.mt November 9, 2021
Episode 10: Data Recovery (DR) Planning – Recovering from IT Disasters

Episode 10: Data Recovery (DR) Planning – Recovering from IT Disasters

Disaster Recovery (DR) aims to ensure the smooth continuation of business whenever the technology...

Tech.mt November 4, 2021
Episode 9: Having a Backup Strategy is Crucial to Protecting Information Assets

Episode 9: Having a Backup Strategy is Crucial to Protecting Information Assets

An IT system or computing device that stores data could stop working at any...

Tech.mt November 2, 2021
Episode 8: Protecting from Denial-of-Service attacks

Episode 8: Protecting from Denial-of-Service attacks

A denial-of-service attack (DDoS) seeks to make a computing system unavailable or unusable to...

Tech.mt October 28, 2021