Skip to content

May 19, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Dr. Strangelove in cyberspace: Experts warn of cyber arms race

More than half of policy makers and global cybersecurity experts believe that an arms race is taking place in cyberspace, according to a new report by McAfee and the Security and Defence Agenda think tank.

February 1, 2012
0 comment
Read More >>

FBI may have used spyware in making case against MegaUpload

The FBI likely employed its CIPAV spyware to eavesdrop on Kim Dotcom and other managers of MegaUpload, according to a report by CNET.

January 31, 2012
0 comment
Read More >>

Trymedia breach exposes credit card numbers of 12,000 digital game customers

Trymedia’s ActiveStore web-based storefront application, which processes digital game purchases made by customers on its partners’ websites, was recently breached, exposing credit card numbers and other personal information of more than 12,000 customer…

January 31, 2012
0 comment
Read More >>

A call for a new standard in infosec training and awareness

A talk at the Information Exploitation Conference at the Home Office’s Security and Policing Exhibition 2012 today addresses the disconnect between user and professional, and calls for a new standard that focuses on training and awareness.

January 31, 2012
0 comment
Read More >>

IE6 users: no longer caught between a rock and a hard place

As Microsoft seeks to wean users away from the aging and insecure Internet Explorer 6, companies with IE6 legacy applications are stuck – they can’t upgrade to a newer OS because IE6 is no longer supported; and they still need IE6.

January 31, 2012
0 comment
Read More >>

Get your free iPhone 5 here…NOT!

The iPhone 5 is expected to hit the market sometime this year, but scammers are looking to give you one for “free” right now.

January 30, 2012
0 comment
Read More >>

I’m not behind Kelihos botnet, claims Sabelnikov

Andrey Sabelnikov, named in Microsoft court papers as controller of the Kelihos botnet, declares his innocence in a LiveJournal post.

January 29, 2012
0 comment
Read More >>

Warining issued for exploit of patched flaw in Windows Media Player

Trend Micro researchers are warning that a recently patched flaw in Windows Media Player is being used by remote hackers to launch malware.

January 27, 2012
0 comment
Read More >>

Technical controls not enough to ensure real cyber security

A new report from the Information Security Forum (ISF) proposes the evolution from simple data defense to cyber resilience.

January 27, 2012
0 comment
Read More >>

Is Carberp poised for global expansion?

New research from anti-malware company ESET shows how easy it is to tailor Carberp to attack new and different targets.

January 27, 2012
0 comment
Read More >>
1 … 39,766 39,767 39,768 39,769 39,770 … 40,000

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • SEPPmail Gateway Flaws Expose Organizations to RCE and Email Traffic Interception May 19, 2026
  • Mythos Preview Automates PoC Exploit Creation for Vulnerability Research May 19, 2026
  • Sources: Intel asks its leading PC partners, including those in the US, China, and Taiwan, to use more 18A CPUs, citing better supply than chips on older nodes (Nikkei Asia) May 19, 2026
  • Earbud sensors can authenticate users by their heartbeat, study finds May 19, 2026
  • Peter Mandelson scandal: the key questions that remain unanswered May 19, 2026
  • Thames Water rescue deal threatened by uncertainty over next prime minister May 19, 2026
  • Tech investors loved this earnings season — but the Iran war is piling pressure on the companies powering the AI boom May 19, 2026

Categories Cloud

africa (4633) Americas (47364) AM Update (5110) Army (4782) Australia news (10683) Business (14154) China (6503) Culture (4616) Cyber Security (5175) cybersecurity (4374) Cyber Security News (5570) Donald Trump (6970) Environment (5724) Europe (20863) Foreign Policy (5128) france (5396) Hacking (8530) Health (4445) India (14115) Israel (6976) Mary Patriot News (4801) Media Wire (5804) middle east (7560) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45519) politics (9983) russia (7882) Security (8226) Show Types (6228) Society (4281) sport (4405) Sports (8650) Tankers (5979) Technology (4855) Trump administration (4827) UK news (23371) ukraine (6640) US Crime News (7572) US news (18571) US politics (27302) World (101532) World news (29320) worldNews (36636)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • SEPPmail Gateway Flaws Expose Organizations to RCE and Email Traffic Interception May 19, 2026
  • Mythos Preview Automates PoC Exploit Creation for Vulnerability Research May 19, 2026
  • Sources: Intel asks its leading PC partners, including those in the US, China, and Taiwan, to use more 18A CPUs, citing better supply than chips on older nodes (Nikkei Asia) May 19, 2026
  • Earbud sensors can authenticate users by their heartbeat, study finds May 19, 2026
  • Peter Mandelson scandal: the key questions that remain unanswered May 19, 2026
  • Thames Water rescue deal threatened by uncertainty over next prime minister May 19, 2026
  • Tech investors loved this earnings season — but the Iran war is piling pressure on the companies powering the AI boom May 19, 2026

Categories Cloud

africa (4633) Americas (47364) AM Update (5110) Army (4782) Australia news (10683) Business (14154) China (6503) Culture (4616) Cyber Security (5175) cybersecurity (4374) Cyber Security News (5570) Donald Trump (6970) Environment (5724) Europe (20863) Foreign Policy (5128) france (5396) Hacking (8530) Health (4445) India (14115) Israel (6976) Mary Patriot News (4801) Media Wire (5804) middle east (7560) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45519) politics (9983) russia (7882) Security (8226) Show Types (6228) Society (4281) sport (4405) Sports (8650) Tankers (5979) Technology (4855) Trump administration (4827) UK news (23371) ukraine (6640) US Crime News (7572) US news (18571) US politics (27302) World (101532) World news (29320) worldNews (36636)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive