Skip to content

April 9, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Drug cartels supplying malware-infected pirated software, Microsoft warns

Criminal syndicates and drug cartels are building large-scale software pirating operations and selling that software – which is likely to contain malware – to fund their operations, warned David Finn, associate general counsel at Microsoft.

February 4, 2011
0 comment
Read More >>

Drug cartels supplying malware-infected pirated software, Microsoft warns

Criminal syndicates and drug cartels are building large-scale software pirating operations and selling that software – which is likely to contain malware – to fund their operations, warned David Finn, associate general counsel at Microsoft.

February 4, 2011
0 comment
Read More >>

Hackers jack up their exploits of vulnerabilities in January

Hackers exploited close to twice as many vulnerabilities as usual in January, half of those being “critical”, according to Fortinet’s monthly threat landscape report.

February 4, 2011
0 comment
Read More >>

FTC requires credit report resellers to beef up data security after breaches

The Federal Trade Commission is requiring three credit report resellers to strengthen their data security procedures and submit independent audits every other year for 20 years as part of a settlement with the agency.

February 4, 2011
0 comment
Read More >>

Microsoft patch will lead to 900 million reboots

Next week’s patch Tuesday will, says Lumension, lead to 900 million reboots of Windows machines around the world. Sadly, whilst this sounds a rather large power-draining volume of unnecessary PC actions, the reality is that it’s not that abnormal.

February 4, 2011
0 comment
Read More >>

Adobe Reader X stops malicious PDF spam, says Sophos

It looks as though Adobe’s new Reader X incorporates a number of security features that block exploits that cybercriminals have tapped in previous Reader viewer applications. Sophos is reporting that its research team has tested the viewer and found th…

February 4, 2011
0 comment
Read More >>

FBI to roll out its super-Google search engine

The N-DEx search engine, which the FBI revealed back in 2008 as a means for US law enforcement agencies to carry out Google-style searches on multi-agency databases, is about to go live in the US.

February 4, 2011
0 comment
Read More >>

Egyptian government taps emergency network for mass pro-Mubarak texts

Reports are coming in that the Egyptian government is using elements of the emergency national broadcast network to pipe tens of thousands of pro-Mubarak text messages on the network of Vodafone Egypt.

February 4, 2011
0 comment
Read More >>

NIST provides advice on securing full virtualization technologies

The National Institute of Standards and Technology (NIST) has issued the final version of its recommendations for securely configuring and using full virtualization technologies, which allow multiple operating systems to run on a single platform.

February 3, 2011
0 comment
Read More >>

Corsaire claims multiple authenticators are not secure enough

A white paper just published by Corsaire claims to show that multiple authenticators – such as PIN codes with security questions – are still not enough to protect private data.

February 3, 2011
0 comment
Read More >>
1 … 38,031 38,032 38,033 38,034 38,035 … 38,172

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Berlin opens Süd Ost Galerie, a new open-air street art landmark April 9, 2026
  • Why Lebanon Is A Bone Of Contention In US-Iran Ceasefire Plan April 9, 2026
  • Have Iran’s Revolutionary Guard Have Put Sea Mines In Strait Of Hormuz? April 9, 2026
  • Why Iranian Hackers Are Emerging As A Threat To US Critical Infrastructure April 9, 2026
  • Mexico: Miner rescued alive after 14 days trapped underground April 9, 2026
  • Opinion: Opinion | Deal Or ‘Setup’? Why Both US And Iran Think This Ceasefire Is A Trap April 9, 2026
  • Drones Rewriting Warfare: Ghatak UCAV on the Horizon April 9, 2026

Categories Cloud

africa (4339) Americas (45270) AM Update (4954) Army (4586) Australia news (10278) Business (13618) China (6129) Culture (4351) cybersecurity (4170) Cyber Security (4911) Cyber Security News (5310) Donald Trump (6547) Environment (5493) Europe (19927) Foreign Policy (4950) france (5158) Hacking (8309) Health (4216) India (13187) Israel (6507) Mary Patriot News (4801) Media Wire (5804) middle east (7204) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43646) politics (9495) russia (7635) Security (7799) Show Types (5567) Society (4089) sport (3968) Sports (8576) Tankers (5579) Technology (4595) Trump administration (4476) UK news (22221) ukraine (6491) US Crime News (7292) US news (17435) US politics (25962) World (96696) World news (28372) worldNews (34840)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Berlin opens Süd Ost Galerie, a new open-air street art landmark April 9, 2026
  • Why Lebanon Is A Bone Of Contention In US-Iran Ceasefire Plan April 9, 2026
  • Have Iran’s Revolutionary Guard Have Put Sea Mines In Strait Of Hormuz? April 9, 2026
  • Why Iranian Hackers Are Emerging As A Threat To US Critical Infrastructure April 9, 2026
  • Mexico: Miner rescued alive after 14 days trapped underground April 9, 2026
  • Opinion: Opinion | Deal Or ‘Setup’? Why Both US And Iran Think This Ceasefire Is A Trap April 9, 2026
  • Drones Rewriting Warfare: Ghatak UCAV on the Horizon April 9, 2026

Categories Cloud

africa (4339) Americas (45270) AM Update (4954) Army (4586) Australia news (10278) Business (13618) China (6129) Culture (4351) cybersecurity (4170) Cyber Security (4911) Cyber Security News (5310) Donald Trump (6547) Environment (5493) Europe (19927) Foreign Policy (4950) france (5158) Hacking (8309) Health (4216) India (13187) Israel (6507) Mary Patriot News (4801) Media Wire (5804) middle east (7204) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43646) politics (9495) russia (7635) Security (7799) Show Types (5567) Society (4089) sport (3968) Sports (8576) Tankers (5579) Technology (4595) Trump administration (4476) UK news (22221) ukraine (6491) US Crime News (7292) US news (17435) US politics (25962) World (96696) World news (28372) worldNews (34840)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive