Skip to content

May 1, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Twitter flood heralds Egypt’s return to the internet

A flood of celebratory and congratulatory tweets on Twitter has greeted the news that internet services have been restored in Egypt.

February 2, 2011
0 comment
Read More >>

Programmers must be literate, Donald Knuth tells IET in Turing Lecture

Software quality would be much better if programmers adopted “literate programming”, according to Stanford University’s unique professor emeritus for the art of computer programming, Donald Knuth.

February 2, 2011
0 comment
Read More >>

Programmers must be literate, Donald Knuth tells IET in Turing Lecture

Software quality would be much better if programmers adopted “literate programming”, according to Stanford University’s unique professor emeritus for the art of computer programming, Donald Knuth.

February 2, 2011
0 comment
Read More >>

Google and Twitter join forces to beat Egyptian internet blackout

Google and Twitter have joined forces to enable Egyptians to tweet using the phone to bypass a government-imposed internet blackout.

February 2, 2011
0 comment
Read More >>

Watch out for Super Bowl scams in your trash-talking tweets

No matter which team you root for in the Super Bowl this Sunday, be careful of scams that might be lurking in your trash-talking tweets or other online communication, warns Mark Maciw, web product manager at Clearswift.

February 1, 2011
0 comment
Read More >>

Hackers could take a security bite out of Android Gingerbread

Researchers at North Carolina State University have discovered a flaw in the Android 2.3 Gingerbread mobile operating system that allows hackers to gain access to information on the phone’s microSD storage card.

February 1, 2011
0 comment
Read More >>

Kaspersky Lab hit by anti-virus software source code leak

Source code that apparently relates to v8 of Kaspersky anti-virus has appeared on BitTorrent and other file-sharing sites in the last few days. According to news wire reports, the source code was leaked by an employee of the IT security vendor who is n…

February 1, 2011
0 comment
Read More >>

Poor firewall implementations pave wave for DDoS attacks

Research published today claims to show that the increasing problem of distributed denial of service (DDoS) attacks has been made worse by a tendency to misconfigure firewalls and intrusion prevention systems (IPS).

February 1, 2011
0 comment
Read More >>

NewNet Communication purchases encryption specialist Traxcom

Privately held network communications supplier NewNet Communication has acquired another business from within its own parent company – secure transactions provider Traxcom Technologies. The move is expected to strengthen the security of NewNet’s mobile…

February 1, 2011
0 comment
Read More >>

Belgacom taps CyberArk for privileged ID management in the cloud

CyberArk has landed a prestigious project for protecting critical applications, identities and information in Belgacom’s data centres in Belgium.

February 1, 2011
0 comment
Read More >>
1 … 39,055 39,056 39,057 39,058 39,059 … 39,195

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump to remove Scottish whisky tariffs after King Charles’ US visit May 1, 2026
  • Opening Hormuz ‘not a humanitarian gesture’: Essential to keeping global food system operating May 1, 2026
  • Workers across the world march for peace and better pay in May Day rallies May 1, 2026
  • French unions rally on Labour Day to defend paid holiday rights May 1, 2026
  • Ruby Gems and Go Modules Used in Campaign Targeting GitHub Actions May 1, 2026
  • Conference League: Strasbourg on the brink after defeat against Rayo Vallecano May 1, 2026
  • Shadow AI risks deepen as 31% of users get no employer training May 1, 2026

Categories Cloud

africa (4507) Americas (46448) AM Update (5047) Army (4680) Australia news (10497) Business (13929) China (6264) Culture (4481) Cyber Security (5059) cybersecurity (4285) Cyber Security News (5456) Donald Trump (6812) Environment (5627) Europe (20431) Foreign Policy (5059) france (5289) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7420) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44697) politics (9749) russia (7783) Security (8036) Show Types (5936) Society (4198) sport (4209) Sports (8621) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22852) ukraine (6572) US Crime News (7444) US news (18091) US politics (26737) World (99439) World news (28921) worldNews (35841)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump to remove Scottish whisky tariffs after King Charles’ US visit May 1, 2026
  • Opening Hormuz ‘not a humanitarian gesture’: Essential to keeping global food system operating May 1, 2026
  • Workers across the world march for peace and better pay in May Day rallies May 1, 2026
  • French unions rally on Labour Day to defend paid holiday rights May 1, 2026
  • Ruby Gems and Go Modules Used in Campaign Targeting GitHub Actions May 1, 2026
  • Conference League: Strasbourg on the brink after defeat against Rayo Vallecano May 1, 2026
  • Shadow AI risks deepen as 31% of users get no employer training May 1, 2026

Categories Cloud

africa (4507) Americas (46448) AM Update (5047) Army (4680) Australia news (10497) Business (13929) China (6264) Culture (4481) Cyber Security (5059) cybersecurity (4285) Cyber Security News (5456) Donald Trump (6812) Environment (5627) Europe (20431) Foreign Policy (5059) france (5289) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7420) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44697) politics (9749) russia (7783) Security (8036) Show Types (5936) Society (4198) sport (4209) Sports (8621) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22852) ukraine (6572) US Crime News (7444) US news (18091) US politics (26737) World (99439) World news (28921) worldNews (35841)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive