Skip to content

April 15, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Spammers tap soft hyphens to beat email intercept security

It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.

October 11, 2010
0 comment
Read More >>

Monthly cyber attacks against Australian military networks more than tripled this year

The Australian military has seen cyber attacks against its networks jump from 200 per month last year to 700 attacks per month this year, according to the Australian Defence Signals Directorate.

October 11, 2010
0 comment
Read More >>

Information security is not just about gizmos and gadgets

Information security is not just about technical solutions, such as hardware and software. It is also about policies and process companies put in place to ensure technical solutions fit in with the broader corporate information security strategy. To pr…

October 11, 2010
0 comment
Read More >>

Fannie Mae contractor faces jail term for planting malware

A former Unix engineer faces 10 years in jail for planting a malicious script designed to destroy data at troubled mortgage giant, Fannie Mae.

October 8, 2010
0 comment
Read More >>

FBI thwarts data breach at Akamai Technologies

A potential data breach at Akamai Technologies was foiled by the Federal Bureau of Investigation (FBI), prosecutors disclosed this week.

October 8, 2010
0 comment
Read More >>

Adobe shares surge on reports of possible Microsoft takeover

Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.

October 8, 2010
0 comment
Read More >>

Prevx signs McAfee CTO as president – plans for tiny footprint cloud-based software

Up and coming IT security vendor Prevx has just signed Christopher Bolin, a former CTO with McAfee, as its new president, and Infosecurity caught up with him this week to discuss his gameplan.

October 8, 2010
0 comment
Read More >>

Spammers tap soft hyphens to beat email intercept security

It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.

October 8, 2010
0 comment
Read More >>

Adobe shares surge on reports of possible Microsoft takeover

Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.

October 8, 2010
0 comment
Read More >>

Mozilla Firefox trojan hacks browser to store passwords

Mozilla Firefox is one of the most popular browser clients currently in use and, as a result is attracting the attentions of hackers, some of whom have developed a keylogger trojan that forces the client to store passwords automatically.

October 8, 2010
0 comment
Read More >>
1 … 38,332 38,333 38,334 38,335 38,336 … 38,446

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • U.S. Space Command Chief Outlines Need For Maneuver Warfare Strategy April 15, 2026
  • Student kills four, wounds 20 in Türkiye’s second school shooting in two days April 15, 2026
  • Guy Fieri speaks out about viral video of friendly exchange with Tate brothers – but the internet isn’t buying it (cloned) April 15, 2026
  • Trump puts China’s Xi ‘and the world’ on notice that the US is ‘very good at fighting’ April 15, 2026
  • Trump says he will fire Fed chair Powell if he stays beyond mandate April 15, 2026
  • Top 10 Best Application Security Testing Companies in 2026 April 15, 2026
  • Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out April 15, 2026

Categories Cloud

africa (4395) Americas (45571) AM Update (4975) Army (4610) Australia news (10349) Business (13707) China (6174) Culture (4387) cybersecurity (4211) Cyber Security (4952) Cyber Security News (5351) Donald Trump (6623) Environment (5524) Europe (20078) Foreign Policy (4991) france (5202) Hacking (8345) Health (4242) India (13305) Israel (6619) Mary Patriot News (4801) Media Wire (5804) middle east (7278) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43951) politics (9564) russia (7672) Security (7872) Show Types (5682) Society (4118) sport (4037) Sports (8587) Tankers (5646) Technology (4624) Trump administration (4527) UK news (22397) ukraine (6509) US Crime News (7325) US news (17622) US politics (26161) World (97448) World news (28544) worldNews (35138)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • U.S. Space Command Chief Outlines Need For Maneuver Warfare Strategy April 15, 2026
  • Student kills four, wounds 20 in Türkiye’s second school shooting in two days April 15, 2026
  • Guy Fieri speaks out about viral video of friendly exchange with Tate brothers – but the internet isn’t buying it (cloned) April 15, 2026
  • Trump puts China’s Xi ‘and the world’ on notice that the US is ‘very good at fighting’ April 15, 2026
  • Trump says he will fire Fed chair Powell if he stays beyond mandate April 15, 2026
  • Top 10 Best Application Security Testing Companies in 2026 April 15, 2026
  • Google, Microsoft, Meta Accused of Tracking Users Even After Privacy Opt-Out April 15, 2026

Categories Cloud

africa (4395) Americas (45571) AM Update (4975) Army (4610) Australia news (10349) Business (13707) China (6174) Culture (4387) cybersecurity (4211) Cyber Security (4952) Cyber Security News (5351) Donald Trump (6623) Environment (5524) Europe (20078) Foreign Policy (4991) france (5202) Hacking (8345) Health (4242) India (13305) Israel (6619) Mary Patriot News (4801) Media Wire (5804) middle east (7278) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (43951) politics (9564) russia (7672) Security (7872) Show Types (5682) Society (4118) sport (4037) Sports (8587) Tankers (5646) Technology (4624) Trump administration (4527) UK news (22397) ukraine (6509) US Crime News (7325) US news (17622) US politics (26161) World (97448) World news (28544) worldNews (35138)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive