Skip to content

April 28, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Spammers tap soft hyphens to beat email intercept security

It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.

October 11, 2010
0 comment
Read More >>

Monthly cyber attacks against Australian military networks more than tripled this year

The Australian military has seen cyber attacks against its networks jump from 200 per month last year to 700 attacks per month this year, according to the Australian Defence Signals Directorate.

October 11, 2010
0 comment
Read More >>

Information security is not just about gizmos and gadgets

Information security is not just about technical solutions, such as hardware and software. It is also about policies and process companies put in place to ensure technical solutions fit in with the broader corporate information security strategy. To pr…

October 11, 2010
0 comment
Read More >>

Fannie Mae contractor faces jail term for planting malware

A former Unix engineer faces 10 years in jail for planting a malicious script designed to destroy data at troubled mortgage giant, Fannie Mae.

October 8, 2010
0 comment
Read More >>

FBI thwarts data breach at Akamai Technologies

A potential data breach at Akamai Technologies was foiled by the Federal Bureau of Investigation (FBI), prosecutors disclosed this week.

October 8, 2010
0 comment
Read More >>

Adobe shares surge on reports of possible Microsoft takeover

Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.

October 8, 2010
0 comment
Read More >>

Prevx signs McAfee CTO as president – plans for tiny footprint cloud-based software

Up and coming IT security vendor Prevx has just signed Christopher Bolin, a former CTO with McAfee, as its new president, and Infosecurity caught up with him this week to discuss his gameplan.

October 8, 2010
0 comment
Read More >>

Spammers tap soft hyphens to beat email intercept security

It seems that spammers are starting to use the so-called ‘SHY’ character – aka a soft hyphen – to fool IT security applications into allowing email applications to allow click-throughs to suspect web pages.

October 8, 2010
0 comment
Read More >>

Adobe shares surge on reports of possible Microsoft takeover

Adobe Systems shares surged 12% after the New York Times said Microsoft may work more closely with the company and possibly acquire it.

October 8, 2010
0 comment
Read More >>

Mozilla Firefox trojan hacks browser to store passwords

Mozilla Firefox is one of the most popular browser clients currently in use and, as a result is attracting the attentions of hackers, some of whom have developed a keylogger trojan that forces the client to store passwords automatically.

October 8, 2010
0 comment
Read More >>
1 … 38,946 38,947 38,948 38,949 38,950 … 39,060

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Microsoft finally open sources DOS 1.0 – and it’s so much more than the code April 28, 2026
  • Slotkin: Pentagon Should Use Anthropic’s Mythos To Spot Cyber Security Gaps April 28, 2026
  • CoAspire Unveils Extended Range Affordable Cruise Missile April 28, 2026
  • Trump hails ‘special relationship’ during ceremonial welcome for King Charles’s state visit April 28, 2026
  • Sources: Apple plans an AI overhaul for photo editing in iOS 27, including using on-device AI models to extend, enhance, and reframe photos (Mark Gurman/Bloomberg) April 28, 2026
  • UK PM Starmer avoids parliamentary probe over Mandelson appointment as US envoy April 28, 2026
  • Justice department files new criminal charges against ex-FBI director Comey April 28, 2026

Categories Cloud

africa (4489) Americas (46269) AM Update (5038) Army (4669) Australia news (10467) Business (13887) China (6250) Culture (4458) cybersecurity (4270) Cyber Security (5038) Cyber Security News (5435) Donald Trump (6779) Environment (5607) Europe (20357) Foreign Policy (5050) france (5274) Hacking (8423) Health (4313) India (13605) Israel (6810) Mary Patriot News (4801) Media Wire (5804) middle east (7401) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44558) politics (9727) russia (7756) Security (8013) Show Types (5884) Society (4181) sport (4172) Sports (8614) Tankers (5800) Technology (4735) Trump administration (4649) UK news (22773) ukraine (6562) US Crime News (7420) US news (18013) US politics (26631) World (99099) World news (28860) worldNews (35738)

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    

Recent Posts

  • Microsoft finally open sources DOS 1.0 – and it’s so much more than the code April 28, 2026
  • Slotkin: Pentagon Should Use Anthropic’s Mythos To Spot Cyber Security Gaps April 28, 2026
  • CoAspire Unveils Extended Range Affordable Cruise Missile April 28, 2026
  • Trump hails ‘special relationship’ during ceremonial welcome for King Charles’s state visit April 28, 2026
  • Sources: Apple plans an AI overhaul for photo editing in iOS 27, including using on-device AI models to extend, enhance, and reframe photos (Mark Gurman/Bloomberg) April 28, 2026
  • UK PM Starmer avoids parliamentary probe over Mandelson appointment as US envoy April 28, 2026
  • Justice department files new criminal charges against ex-FBI director Comey April 28, 2026

Categories Cloud

africa (4489) Americas (46269) AM Update (5038) Army (4669) Australia news (10467) Business (13887) China (6250) Culture (4458) cybersecurity (4270) Cyber Security (5038) Cyber Security News (5435) Donald Trump (6779) Environment (5607) Europe (20357) Foreign Policy (5050) france (5274) Hacking (8423) Health (4313) India (13605) Israel (6810) Mary Patriot News (4801) Media Wire (5804) middle east (7401) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44558) politics (9727) russia (7756) Security (8013) Show Types (5884) Society (4181) sport (4172) Sports (8614) Tankers (5800) Technology (4735) Trump administration (4649) UK news (22773) ukraine (6562) US Crime News (7420) US news (18013) US politics (26631) World (99099) World news (28860) worldNews (35738)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

April 2026
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive