Skip to content

April 13, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Adobe Reader X stops malicious PDF spam, says Sophos

It looks as though Adobe’s new Reader X incorporates a number of security features that block exploits that cybercriminals have tapped in previous Reader viewer applications. Sophos is reporting that its research team has tested the viewer and found th…

February 4, 2011
0 comment
Read More >>

FBI to roll out its super-Google search engine

The N-DEx search engine, which the FBI revealed back in 2008 as a means for US law enforcement agencies to carry out Google-style searches on multi-agency databases, is about to go live in the US.

February 4, 2011
0 comment
Read More >>

Egyptian government taps emergency network for mass pro-Mubarak texts

Reports are coming in that the Egyptian government is using elements of the emergency national broadcast network to pipe tens of thousands of pro-Mubarak text messages on the network of Vodafone Egypt.

February 4, 2011
0 comment
Read More >>

NIST provides advice on securing full virtualization technologies

The National Institute of Standards and Technology (NIST) has issued the final version of its recommendations for securely configuring and using full virtualization technologies, which allow multiple operating systems to run on a single platform.

February 3, 2011
0 comment
Read More >>

Corsaire claims multiple authenticators are not secure enough

A white paper just published by Corsaire claims to show that multiple authenticators – such as PIN codes with security questions – are still not enough to protect private data.

February 3, 2011
0 comment
Read More >>

Trusteer reports US and Russia now primary sources of Zeus servers

Trusteer says that its research into the Zeus malware and botnet command and control (C&C) servers that control the swarms of infected internet users shows Russian and US top level domains are now the main home of C&C infestations.

February 3, 2011
0 comment
Read More >>

BoxSentry rebrands itself as TrustSphere

New name, and new vision – that was the crux of the explanation delivered by the chief executive of the security firm formerly known as BoxSentry.

February 3, 2011
0 comment
Read More >>

Apple faces second lawsuit over UDID disclosure to third parties

Apple is being sued again over alleged disclosure of its mobile devices’ unique device identifiers (UDIDs) to third parties without users’ consent.

February 2, 2011
0 comment
Read More >>

Twitter flood heralds Egypt’s return to the internet

A flood of celebratory and congratulatory tweets on Twitter has greeted the news that internet services have been restored in Egypt.

February 2, 2011
0 comment
Read More >>

Programmers must be literate, Donald Knuth tells IET in Turing Lecture

Software quality would be much better if programmers adopted “literate programming”, according to Stanford University’s unique professor emeritus for the art of computer programming, Donald Knuth.

February 2, 2011
0 comment
Read More >>
1 … 38,179 38,180 38,181 38,182 38,183 … 38,320

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • How Would a Blockade of the Strait of Hormuz Work? Here Are Some Possibilities. April 13, 2026
  • Iran’s parliament speaker says U.S. will be “nostalgic” for $4 gas as oil prices fuel inflation April 13, 2026
  • Trump says U.S. will blockade Strait of Hormuz after Iran peace talks collapse April 13, 2026
  • Congressman Eric Swalwell quits California governor race amid sexual misconduct claims April 13, 2026
  • Eric Swalwell drops out of California governor’s race after multiple sexual misconduct allegations April 13, 2026
  • Middle East crisis live: Iranian negotiator says ‘we will not bow to any threats’ as Trump says US navy will blockade strait of Hormuz April 13, 2026
  • Orbán era swept away by Péter Magyar’s Hungary election landslide April 13, 2026

Categories Cloud

africa (4364) Americas (45424) AM Update (4966) Army (4599) Australia news (10306) Business (13654) China (6150) Culture (4367) cybersecurity (4185) Cyber Security (4927) Cyber Security News (5325) Donald Trump (6594) Environment (5509) Europe (20003) Foreign Policy (4979) france (5181) Hacking (8329) Health (4224) India (13255) Israel (6567) Mary Patriot News (4801) Media Wire (5804) middle east (7247) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43809) politics (9527) russia (7657) Security (7835) Show Types (5646) Society (4102) sport (3996) Sports (8579) Tankers (5609) Technology (4611) Trump administration (4503) UK news (22307) ukraine (6501) US Crime News (7310) US news (17539) US politics (26072) World (97106) World news (28464) worldNews (35022)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • How Would a Blockade of the Strait of Hormuz Work? Here Are Some Possibilities. April 13, 2026
  • Iran’s parliament speaker says U.S. will be “nostalgic” for $4 gas as oil prices fuel inflation April 13, 2026
  • Trump says U.S. will blockade Strait of Hormuz after Iran peace talks collapse April 13, 2026
  • Congressman Eric Swalwell quits California governor race amid sexual misconduct claims April 13, 2026
  • Eric Swalwell drops out of California governor’s race after multiple sexual misconduct allegations April 13, 2026
  • Middle East crisis live: Iranian negotiator says ‘we will not bow to any threats’ as Trump says US navy will blockade strait of Hormuz April 13, 2026
  • Orbán era swept away by Péter Magyar’s Hungary election landslide April 13, 2026

Categories Cloud

africa (4364) Americas (45424) AM Update (4966) Army (4599) Australia news (10306) Business (13654) China (6150) Culture (4367) cybersecurity (4185) Cyber Security (4927) Cyber Security News (5325) Donald Trump (6594) Environment (5509) Europe (20003) Foreign Policy (4979) france (5181) Hacking (8329) Health (4224) India (13255) Israel (6567) Mary Patriot News (4801) Media Wire (5804) middle east (7247) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43809) politics (9527) russia (7657) Security (7835) Show Types (5646) Society (4102) sport (3996) Sports (8579) Tankers (5609) Technology (4611) Trump administration (4503) UK news (22307) ukraine (6501) US Crime News (7310) US news (17539) US politics (26072) World (97106) World news (28464) worldNews (35022)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive