Skip to content

April 27, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Internet ‘kill switch’ reports highlight need for contingency planning, say Infosecurity Europe organisers

Reports that President Obama is formulating plans to develop an internet ‘kill switch’, following infrastructure issues raised during the aftermath of the Egypt internet shutdown, should be viewed as a red flag to IT security professionals.

February 22, 2011
0 comment
Read More >>

Russian police squash major pharmacy spam campaign

It seems that Russian police are working steadily to crush the rising tide of so-called pharma spam campaigns, with one security researcher having heard about a raid on the hackers behind the Rx-Promotions scheme.

February 22, 2011
0 comment
Read More >>

Zeus malware appears with fake digital certificate

A German IT security vendor has discovered a version of Zeus that has been signed with its own digital certificate – a move that could fool some corporates into installing the malware thinking it is a legitimate piece of code.

February 22, 2011
0 comment
Read More >>

Credant embraces the cloud with on-net policy-based encryption

Credant Technologies has started testing its data encryption technology in the cloud with a select number of beta test clients, promising other cloud security offerings in the near future.

February 21, 2011
0 comment
Read More >>

Security researcher discovers Rapidshare flaw

A security researcher has detailed how a flaw has been discovered and exploited on Rapidshare, the world’s largest file-sharing service.

February 21, 2011
0 comment
Read More >>

Oracle fixes 21 flaws in Java SE, Java for Business

Oracle is fixing 21 flaws in its Java SE and Java for Business products in its February critical patch update issued this week.

February 18, 2011
0 comment
Read More >>

Insecure software plays key role in creating cybersecurity vulnerabilities

Research just published claims to show that a failure to invest in secure software delivery is placing businesses at risk

February 18, 2011
0 comment
Read More >>

Free risk analysis/management app released for iPhone, iPad and iPod touch

Citicus, a corporate risk management and compliance specialist, has released a risk analysis/management app for the iOS range of Apple devices – the iPhone, iPad and iPod touch.

February 18, 2011
0 comment
Read More >>

Intergrity and honesty top list of most important federal government cybersecurity skills

Integrity and honesty top the list of skills needed for the current and future federal cybersecurity workforce, according to an Office of Personnel Management (OPM) survey.

February 18, 2011
0 comment
Read More >>

End-of-life IT assets pose serious security risk to most firms

Research just published claims that end-of-life IT assets – especially portable devices like smartphones and laptops – pose a serious data security threat to many firms.

February 18, 2011
0 comment
Read More >>
1 … 38,844 38,845 38,846 38,847 38,848 … 38,991

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Russian fighters confirm withdrawal from northern Mali city after separatist attacks April 27, 2026
  • Get a month of 5G Home Internet on T-Mobile and $300 cash back – here’s how April 27, 2026
  • Adobe Creative Cloud Pro is now 50% off – how to get the deal April 27, 2026
  • US Navy commissions 26th Virginia-class submarine April 27, 2026
  • Performer describes locking eyes with Trump as they ducked for cover during shooting April 27, 2026
  • Iran offers to reopen Strait of Hormuz if US lifts its blockade and the war ends: Officials April 27, 2026
  • Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side April 27, 2026

Categories Cloud

africa (4476) Americas (46184) AM Update (5031) Army (4665) Australia news (10452) Business (13864) China (6245) Culture (4449) cybersecurity (4264) Cyber Security (5027) Cyber Security News (5425) Donald Trump (6758) Environment (5596) Europe (20324) Foreign Policy (5046) france (5265) Hacking (8415) Health (4305) India (13580) Israel (6797) Mary Patriot News (4801) Media Wire (5804) middle east (7385) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44492) politics (9702) russia (7743) Security (7993) Show Types (5862) Society (4175) sport (4155) Sports (8613) Tankers (5778) Technology (4716) Trump administration (4634) UK news (22723) ukraine (6560) US Crime News (7412) US news (17959) US politics (26575) World (98923) World news (28823) worldNews (35677)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Russian fighters confirm withdrawal from northern Mali city after separatist attacks April 27, 2026
  • Get a month of 5G Home Internet on T-Mobile and $300 cash back – here’s how April 27, 2026
  • Adobe Creative Cloud Pro is now 50% off – how to get the deal April 27, 2026
  • US Navy commissions 26th Virginia-class submarine April 27, 2026
  • Performer describes locking eyes with Trump as they ducked for cover during shooting April 27, 2026
  • Iran offers to reopen Strait of Hormuz if US lifts its blockade and the war ends: Officials April 27, 2026
  • Mythos Changed the Math on Vulnerability Discovery. Most Teams Aren’t Ready for the Remediation Side April 27, 2026

Categories Cloud

africa (4476) Americas (46184) AM Update (5031) Army (4665) Australia news (10452) Business (13864) China (6245) Culture (4449) cybersecurity (4264) Cyber Security (5027) Cyber Security News (5425) Donald Trump (6758) Environment (5596) Europe (20324) Foreign Policy (5046) france (5265) Hacking (8415) Health (4305) India (13580) Israel (6797) Mary Patriot News (4801) Media Wire (5804) middle east (7385) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44492) politics (9702) russia (7743) Security (7993) Show Types (5862) Society (4175) sport (4155) Sports (8613) Tankers (5778) Technology (4716) Trump administration (4634) UK news (22723) ukraine (6560) US Crime News (7412) US news (17959) US politics (26575) World (98923) World news (28823) worldNews (35677)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive