Skip to content

April 23, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Jericho Forum unveils best practice identity commandments

The Jericho Forum has taken the wraps off a set of best practice identity principles – enshrined in a set of commandments – which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.

May 11, 2011
0 comment
Read More >>

Jericho Forum unveils best practice identity commandments

The Jericho Forum has taken the wraps off a set of best practice identity principles – enshrined in a set of commandments – which seek to lay down the ground rules for IT security professionals when dealing with the complex world of digital identities.

May 11, 2011
0 comment
Read More >>

Facebook flaws leaks millions of data elements to third parties claims researcher

The reputation of the apparent cybercriminal’s playground that is Facebook took another battering this week after a Symantec researcher revealed that as many as 100,000 Facebook applications are leaking data to third parties.

May 11, 2011
0 comment
Read More >>

Organizations not equipped to prevent DDoS attacks, DNS failures

Many organizations are not equipped to prevent and respond to web infrastructure failures caused by distributed denial of service (DDoS) attacks and Domain Name System (DNS) failures, according to research commissioned by VeriSign.

May 10, 2011
0 comment
Read More >>

WebGL opens browser to attacks that can disable computer

A researcher at the Context Information Security consulting firm has identified a number of serious vulnerabilities in the new WebGL 3D graphics standard enabled by default in Firefox 4 and Google Chrome browsers, and as an option in the Apple Safari b…

May 10, 2011
0 comment
Read More >>

FERC wants more power to protect electric grid from cyber attacks

The Federal Energy Regulatory Commission (FERC) is looking to expand its authority to protect the electrical grid against cyber attacks.

May 10, 2011
0 comment
Read More >>

Sony Ericsson posts info on hacking Xperia Android phones

In a move that has caused raised eyebrows in the smartphone industry, Sony Ericsson has posted detailed information on how to hack its Xperia range of Android smartphones.

May 10, 2011
0 comment
Read More >>

TalkTalk introduces first ISP-level malicious URL filtering service

TalkTalk, a third-party telco and broadband supplier, has launched the UK’s first ISP-level broadband security service.

May 10, 2011
0 comment
Read More >>

Context discovers security flaws in WebGL technology

Context Information Security claims to have discovered a range of security flaws in WebGL technology, a web-based extension to the JavaScript programming language that allows 3D graphic images to appear with users’ web browsers.

May 9, 2011
0 comment
Read More >>

Curiosity kills the cat as hackers use new infection techniques

Hackers appear to be using social networking and news trending topics, judging from a recent analysis from Luis Corrons, technical director with Panda Security, who notes that the death of Osama bin Laden and the Royal Wedding have been used as lures i…

May 9, 2011
0 comment
Read More >>
1 … 38,655 38,656 38,657 38,658 38,659 … 38,824

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • 98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere April 23, 2026
  • Trump orders US Navy to attack any boats laying mines in Strait of Hormuz April 23, 2026
  • Trump orders Navy to ‘shoot and kill any boat’ laying mines in Hormuz Strait April 23, 2026
  • Career Spotlight: Travel Nurse? April 23, 2026
  • Apple Fixes iOS Notification Bug Exposing Deleted Messages April 23, 2026
  • Inside the 3-hour operation to rescue 7 tourists, including 3 kids, from a cliff in Australia April 23, 2026
  • Prediction market Kalshi suspends three political candidates for betting on their own races April 23, 2026

Categories Cloud

africa (4451) Americas (45969) AM Update (5018) Army (4652) Australia news (10423) Business (13829) China (6210) Culture (4433) cybersecurity (4249) Cyber Security (5007) Cyber Security News (5405) Donald Trump (6704) Environment (5574) Europe (20259) Foreign Policy (5029) france (5248) Hacking (8393) Health (4285) India (13491) Israel (6750) Mary Patriot News (4801) Media Wire (5804) middle east (7358) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44339) politics (9663) russia (7721) Security (7954) Show Types (5808) Society (4159) sport (4118) Sports (8606) Tankers (5746) Technology (4697) Trump administration (4598) UK news (22629) ukraine (6544) US Crime News (7385) US news (17853) US politics (26431) World (98447) World news (28729) worldNews (35491)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • 98% of IT leaders want digital sovereignty: Now SUSE is operationalizing it for companies everywhere April 23, 2026
  • Trump orders US Navy to attack any boats laying mines in Strait of Hormuz April 23, 2026
  • Trump orders Navy to ‘shoot and kill any boat’ laying mines in Hormuz Strait April 23, 2026
  • Career Spotlight: Travel Nurse? April 23, 2026
  • Apple Fixes iOS Notification Bug Exposing Deleted Messages April 23, 2026
  • Inside the 3-hour operation to rescue 7 tourists, including 3 kids, from a cliff in Australia April 23, 2026
  • Prediction market Kalshi suspends three political candidates for betting on their own races April 23, 2026

Categories Cloud

africa (4451) Americas (45969) AM Update (5018) Army (4652) Australia news (10423) Business (13829) China (6210) Culture (4433) cybersecurity (4249) Cyber Security (5007) Cyber Security News (5405) Donald Trump (6704) Environment (5574) Europe (20259) Foreign Policy (5029) france (5248) Hacking (8393) Health (4285) India (13491) Israel (6750) Mary Patriot News (4801) Media Wire (5804) middle east (7358) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44339) politics (9663) russia (7721) Security (7954) Show Types (5808) Society (4159) sport (4118) Sports (8606) Tankers (5746) Technology (4697) Trump administration (4598) UK news (22629) ukraine (6544) US Crime News (7385) US news (17853) US politics (26431) World (98447) World news (28729) worldNews (35491)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive