Skip to content

April 10, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Free risk analysis/management app released for iPhone, iPad and iPod touch

Citicus, a corporate risk management and compliance specialist, has released a risk analysis/management app for the iOS range of Apple devices – the iPhone, iPad and iPod touch.

February 18, 2011
0 comment
Read More >>

Intergrity and honesty top list of most important federal government cybersecurity skills

Integrity and honesty top the list of skills needed for the current and future federal cybersecurity workforce, according to an Office of Personnel Management (OPM) survey.

February 18, 2011
0 comment
Read More >>

End-of-life IT assets pose serious security risk to most firms

Research just published claims that end-of-life IT assets – especially portable devices like smartphones and laptops – pose a serious data security threat to many firms.

February 18, 2011
0 comment
Read More >>

Pharmacy spam campaign hijacks Google brand name

A new pharma spam campaign uses the Google brand. More than 250 similar blog-related campaigns have been tracked in the last two days.

February 18, 2011
0 comment
Read More >>

West Virginia hospital exposed personal data on 3,655 patients

The West Virginia Attorney General’s Office announced that personal information of 3,655 patients at the Charleston Area Medical Center (CAMC) was placed onto a publicly available website.

February 17, 2011
0 comment
Read More >>

RSA 2011: Application whitelisting comes to the consumer

Application whitelisting technology is hardly a novel concept – in fact, the technology has been available to enterprises for some years now. But, as GlobalSCAPE executives told Infosecurity at this year’s RSA Conference in San Francisco, application w…

February 17, 2011
0 comment
Read More >>

BBC 6 Music and 1Xtra websites infected by Phoenix exploit kit hack

Visitors to two websites operated by the BBC were injected by malicious code earlier this week, opening up users to attacks by hackers, claims Websense.

February 17, 2011
0 comment
Read More >>

Lumension releases beta version of its Application Scanner v2.0

Lumension has released a beta version of its free Application Scanner v2.0 that scans executable files and identifies all applications within the endpoint environment, along with its Endpoint Intelligence Center (EIC) that consolidates malware, vulnera…

February 17, 2011
0 comment
Read More >>

RSA: Fake AV Companies Making More Money than Security Vendors

Having spoken on the ‘Public, meet private: Lessons learned in chasing cyber crooks’ panel at the RSA 2011 conference in San Francisco, Pedro Bustamante, senior research analyst at Panda Security, tells Infosecurity’s Eleanor Dallaway why geography is …

February 17, 2011
0 comment
Read More >>

Education programs are hardly a security ‘silver bullet’

User education is often touted as a cornerstone of any effective IT security program. But as Jack Daniel, community development manager with internet security firm Astaro contends, not every organization will reap benefits from educating its end-users.

February 16, 2011
0 comment
Read More >>
1 … 38,094 38,095 38,096 38,097 38,098 … 38,240

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Trump’s war, Melania and Epstein, with US editor Betsy Reed – The Latest April 10, 2026
  • India Develops Folding‑Fin ASTRA MK-2 To Boost Stealth Firepower For AMCA And Ghatak Combat UAV April 10, 2026
  • IAF Issues RFI For 4D Long Range Radars With 450km Detection Capability April 10, 2026
  • Russia Factor Casts Shadow On India–France Rafale Deal Progress April 10, 2026
  • ISRO Completes Second Integrated Air Drop Test April 10, 2026
  • Indigenous Propulsion Pioneer: Pune Start-Up Set For Historic Reusable Rocket Flight On 15 August 2026 April 10, 2026
  • Apollo Micro Systems Becomes Sole Indian Developer of Naval Limpet Mines Following Successful Blast Trials April 10, 2026

Categories Cloud

africa (4351) Americas (45349) AM Update (4963) Army (4593) Australia news (10294) Business (13640) China (6139) Culture (4362) cybersecurity (4179) Cyber Security (4924) Cyber Security News (5323) Donald Trump (6572) Environment (5506) Europe (19965) Foreign Policy (4964) france (5172) Hacking (8320) Health (4220) India (13222) Israel (6538) Mary Patriot News (4801) Media Wire (5804) middle east (7221) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43727) politics (9514) russia (7649) Security (7813) Show Types (5594) Society (4097) sport (3980) Sports (8577) Tankers (5607) Technology (4605) Trump administration (4489) UK news (22262) ukraine (6497) US Crime News (7300) US news (17485) US politics (26016) World (96882) World news (28425) worldNews (34907)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Trump’s war, Melania and Epstein, with US editor Betsy Reed – The Latest April 10, 2026
  • India Develops Folding‑Fin ASTRA MK-2 To Boost Stealth Firepower For AMCA And Ghatak Combat UAV April 10, 2026
  • IAF Issues RFI For 4D Long Range Radars With 450km Detection Capability April 10, 2026
  • Russia Factor Casts Shadow On India–France Rafale Deal Progress April 10, 2026
  • ISRO Completes Second Integrated Air Drop Test April 10, 2026
  • Indigenous Propulsion Pioneer: Pune Start-Up Set For Historic Reusable Rocket Flight On 15 August 2026 April 10, 2026
  • Apollo Micro Systems Becomes Sole Indian Developer of Naval Limpet Mines Following Successful Blast Trials April 10, 2026

Categories Cloud

africa (4351) Americas (45349) AM Update (4963) Army (4593) Australia news (10294) Business (13640) China (6139) Culture (4362) cybersecurity (4179) Cyber Security (4924) Cyber Security News (5323) Donald Trump (6572) Environment (5506) Europe (19965) Foreign Policy (4964) france (5172) Hacking (8320) Health (4220) India (13222) Israel (6538) Mary Patriot News (4801) Media Wire (5804) middle east (7221) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43727) politics (9514) russia (7649) Security (7813) Show Types (5594) Society (4097) sport (3980) Sports (8577) Tankers (5607) Technology (4605) Trump administration (4489) UK news (22262) ukraine (6497) US Crime News (7300) US news (17485) US politics (26016) World (96882) World news (28425) worldNews (34907)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive