Skip to content

May 21, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot
  • Home
  • /

Author: CySecBot

Barracuda Networks bug bounty scheme slammed by Idappcom

Email and web security specialist Barracuda Networks has launched a ‘bug bounty’ scheme – offering programmers more than $3100 to anyone who can hack into their security software – and has immediately flown into a storm of criticism for sending the wro…

November 12, 2010
0 comment
Read More >>

Over a million mobile phones hit by virus in China

Over a million mobile phones in China have been hit by a virus that steals contact information to commit click fraud and propagate the virus.

November 12, 2010
0 comment
Read More >>

Verizon launches website to collect information on data breaches

Verizon has launched a website designed to collect and share information about data breach incidents that are reported by participating organizations.

November 12, 2010
0 comment
Read More >>

Google Android security exploit made fully public by ITsec researcher

An IT security researcher has reportedly released the source code that could allow a hacker to gain remote access to a Google Android smartphone across the internet.

November 12, 2010
0 comment
Read More >>

Digital rights management’s role in business explained

Digital rights management (DRM) is fast becoming a normal security feature in a growing number of Far Eastern companies and, says Jason Sohn, deputy general manager with Korean DRM specialist Fasoo.com, the same thing is now happening here in the UK.

November 12, 2010
0 comment
Read More >>

Congresswoman says chance of cyber attack against electric grid is 100%

Rep. Yvette Clarke (D-NY) delivered the evening keynote during the SC Congress in mid-town Manhattan yesterday, as the member of the House Committee on Homeland Security told the audience that the US electric grid remains vulnerable to a near-certain c…

November 11, 2010
0 comment
Read More >>

HP pays $16.25m in fraud settlement

Hewlett-Packard is to pay $16.25m (£10m) for alleged fraud, following an extensive investigation by the Federal Communications Commission (FCC) and Department of Justice (DoJ).

November 11, 2010
0 comment
Read More >>

EU legal threat stirs Home Office on interception opt-ins

People who use the internet may have greater protection from electronic eavesdroppers following a consultation on changes to the Regulation of Investigatory Powers Act (RIPA).

November 11, 2010
0 comment
Read More >>

Entrust teams with EDAPS to secure Interpol’s identification documents

Entrust, the identity security specialist, has teamed up with EDAPS, the Ukrainian consortium of high-tech firms, to develop a highly secure document identification system for Interpol, the international crime agency.

November 11, 2010
0 comment
Read More >>

Forrester zero trust model design to make entire network secure

Forrester said that it has developed a “zero trust” model designed to make security ubiquitous through the network, not just at the perimeter.

November 10, 2010
0 comment
Read More >>
1 … 39,998 39,999 40,000 40,001 40,002 … 40,121

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump envoy says US should restore its ‘footprint’ in Greenland May 21, 2026
  • Ubisoft shares plunge 16% after Assassin’s Creed maker warns of annual profit loss May 21, 2026
  • Iran reviews U.S. peace proposal as Trump says he’s willing to wait ‘a few days’ May 21, 2026
  • Disaster narrowly averted in United Arab Emirates, Nuclear Energy Watchdog Chief, Grossi tells Security Council May 21, 2026
  • Riverbed introduces new Aternity tools for autonomous IT operations May 21, 2026
  • Security Council reform ‘is absolutely essential’: Guterres May 21, 2026
  • Critical Drupal Vulnerability Could Leave Sites Open to Cyberattack May 21, 2026

Categories Cloud

africa (4651) Americas (47524) AM Update (5119) Army (4794) Australia news (10704) Business (14191) China (6525) Culture (4631) Cyber Security (5200) cybersecurity (4385) Cyber Security News (5595) Donald Trump (6994) Environment (5741) Europe (20930) Foreign Policy (5154) france (5403) Hacking (8546) Health (4461) India (14186) Israel (6995) Mary Patriot News (4801) Media Wire (5804) middle east (7578) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45638) politics (10020) russia (7905) Security (8250) Show Types (6262) Society (4289) sport (4433) Sports (8653) Tankers (6006) Technology (4876) Trump administration (4836) UK news (23449) ukraine (6657) US Crime News (7593) US news (18630) US politics (27385) World (101852) World news (29368) worldNews (36727)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Trump envoy says US should restore its ‘footprint’ in Greenland May 21, 2026
  • Ubisoft shares plunge 16% after Assassin’s Creed maker warns of annual profit loss May 21, 2026
  • Iran reviews U.S. peace proposal as Trump says he’s willing to wait ‘a few days’ May 21, 2026
  • Disaster narrowly averted in United Arab Emirates, Nuclear Energy Watchdog Chief, Grossi tells Security Council May 21, 2026
  • Riverbed introduces new Aternity tools for autonomous IT operations May 21, 2026
  • Security Council reform ‘is absolutely essential’: Guterres May 21, 2026
  • Critical Drupal Vulnerability Could Leave Sites Open to Cyberattack May 21, 2026

Categories Cloud

africa (4651) Americas (47524) AM Update (5119) Army (4794) Australia news (10704) Business (14191) China (6525) Culture (4631) Cyber Security (5200) cybersecurity (4385) Cyber Security News (5595) Donald Trump (6994) Environment (5741) Europe (20930) Foreign Policy (5154) france (5403) Hacking (8546) Health (4461) India (14186) Israel (6995) Mary Patriot News (4801) Media Wire (5804) middle east (7578) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45638) politics (10020) russia (7905) Security (8250) Show Types (6262) Society (4289) sport (4433) Sports (8653) Tankers (6006) Technology (4876) Trump administration (4836) UK news (23449) ukraine (6657) US Crime News (7593) US news (18630) US politics (27385) World (101852) World news (29368) worldNews (36727)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive