Skip to content

March 20, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

August 8, 2014Comments Off on BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.

Read More >>

BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

August 8, 2014Comments Off on BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

Read More >>

BlackHat 2014: Square Launches Bug Bounty Program

August 8, 2014Comments Off on BlackHat 2014: Square Launches Bug Bounty Program

The program has paid $250-$1,500 per bug for uncovering card payment issues.

Read More >>

Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

August 8, 2014Comments Off on Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

Read More >>

FBI Used Drive-By-Downloads to Expose Tor Pedophiles

August 8, 2014Comments Off on FBI Used Drive-By-Downloads to Expose Tor Pedophiles

Controversial Operation Torpedo has come to light through released court documents.

Read More >>

BlackHat 2014: Airport Scanners Riddled with Security Flaws

August 8, 2014Comments Off on BlackHat 2014: Airport Scanners Riddled with Security Flaws

The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

Read More >>

WordPress Vulnerability Affects A Quarter of the Internet

August 7, 2014Comments Off on WordPress Vulnerability Affects A Quarter of the Internet

The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

Read More >>

John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

August 7, 2014Comments Off on John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

Read More >>

NSS Launches Cyber Resiliency Center

August 7, 2014Comments Off on NSS Launches Cyber Resiliency Center

The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.

Read More >>

Black Hat 2014 Keynote: What InfoSec Needs to Do

August 7, 2014Comments Off on Black Hat 2014 Keynote: What InfoSec Needs to Do

Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.

Read More >>
1 … 100,004 100,005 100,006 100,007 100,008 … 100,423

Archives

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    

Recent Posts

  • Here’s What Happened in the War in the Middle East on Thursday March 20, 2026
  • US Takes Down Botnets Used in Record-Breaking Cyberattacks March 20, 2026
  • Desperate for food drought-stricken Kenyans turn to the gingerbread tree March 20, 2026
  • Nearly 100 ships pass the Hormuz Strait – who is getting through? March 20, 2026
  • Iranians prepares for Persian new year under shadow of war March 20, 2026
  • Super Micro co-founder, employee and contractor smuggled Nvidia chips to China, U.S. prosecutors charge March 20, 2026
  • Missing American college student found dead in Barcelona March 20, 2026

Categories Cloud

africa (4249) Americas (44248) AM Update (4881) Army (4486) Australia news (10074) Business (13381) China (6032) Culture (4264) cybersecurity (4058) Cyber Security (4765) Cyber Security News (5168) Donald Trump (6273) Environment (5381) Europe (19529) Foreign Policy (4894) france (5012) Hacking (8203) Health (4123) India (12752) Israel (6128) Mary Patriot News (4801) Media Wire (5804) middle east (6933) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (42751) politics (9282) russia (7527) Security (7586) Show Types (5124) Society (3967) Sports (8535) Tankers (5363) Technology (4482) Trump administration (4274) UK news (21683) ukraine (6439) Uncategorized (3888) US Crime News (7173) US news (16836) US politics (25303) World (94199) World news (27890) worldNews (33868)

Archives

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    

Recent Posts

  • Here’s What Happened in the War in the Middle East on Thursday March 20, 2026
  • US Takes Down Botnets Used in Record-Breaking Cyberattacks March 20, 2026
  • Desperate for food drought-stricken Kenyans turn to the gingerbread tree March 20, 2026
  • Nearly 100 ships pass the Hormuz Strait – who is getting through? March 20, 2026
  • Iranians prepares for Persian new year under shadow of war March 20, 2026
  • Super Micro co-founder, employee and contractor smuggled Nvidia chips to China, U.S. prosecutors charge March 20, 2026
  • Missing American college student found dead in Barcelona March 20, 2026

Categories Cloud

africa (4249) Americas (44248) AM Update (4881) Army (4486) Australia news (10074) Business (13381) China (6032) Culture (4264) cybersecurity (4058) Cyber Security (4765) Cyber Security News (5168) Donald Trump (6273) Environment (5381) Europe (19529) Foreign Policy (4894) france (5012) Hacking (8203) Health (4123) India (12752) Israel (6128) Mary Patriot News (4801) Media Wire (5804) middle east (6933) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (42751) politics (9282) russia (7527) Security (7586) Show Types (5124) Society (3967) Sports (8535) Tankers (5363) Technology (4482) Trump administration (4274) UK news (21683) ukraine (6439) Uncategorized (3888) US Crime News (7173) US news (16836) US politics (25303) World (94199) World news (27890) worldNews (33868)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Feb    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive