Skip to content

May 1, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

August 8, 2014Comments Off on Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

Espionage malware has persisted in embassies and state offices for at least four years.

Read More >>

BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

August 8, 2014Comments Off on BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.

Read More >>

BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

August 8, 2014Comments Off on BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

Read More >>

BlackHat 2014: Square Launches Bug Bounty Program

August 8, 2014Comments Off on BlackHat 2014: Square Launches Bug Bounty Program

The program has paid $250-$1,500 per bug for uncovering card payment issues.

Read More >>

Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

August 8, 2014Comments Off on Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

Read More >>

FBI Used Drive-By-Downloads to Expose Tor Pedophiles

August 8, 2014Comments Off on FBI Used Drive-By-Downloads to Expose Tor Pedophiles

Controversial Operation Torpedo has come to light through released court documents.

Read More >>

BlackHat 2014: Airport Scanners Riddled with Security Flaws

August 8, 2014Comments Off on BlackHat 2014: Airport Scanners Riddled with Security Flaws

The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

Read More >>

WordPress Vulnerability Affects A Quarter of the Internet

August 7, 2014Comments Off on WordPress Vulnerability Affects A Quarter of the Internet

The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

Read More >>

John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

August 7, 2014Comments Off on John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

Read More >>

NSS Launches Cyber Resiliency Center

August 7, 2014Comments Off on NSS Launches Cyber Resiliency Center

The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.

Read More >>
1 … 104,373 104,374 104,375 104,376 104,377 … 104,792

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • The persistent notion that AI disruption could create a permanent underclass signals how much collateral damage AI companies might tolerate in pursuit of AGI (Jasmine Sun/New York Times) May 1, 2026
  • Oil rises as Trump faces crucial 60-day deadline for Iran war May 1, 2026
  • Condemnation and protests against Israel’s raid of Gaza aid flotilla May 1, 2026
  • Trump praises King Charles as the ‘greatest’ May 1, 2026
  • Sens. Kirsten Gillibrand and Dave McCormick introduce a bill banning members of the legislative and executive branches from trading on prediction markets (Jason Beeferman/Politico) May 1, 2026
  • ‘US Not At War With Iran’: Team Trump’s Big Claim As 60-Day Clock Stops Today May 1, 2026
  • Your TV can sound a lot better: 7 easy but unexpected ways to improve audio quality May 1, 2026

Categories Cloud

africa (4506) Americas (46444) AM Update (5047) Army (4680) Australia news (10496) Business (13928) China (6263) Culture (4478) cybersecurity (4285) Cyber Security (5056) Cyber Security News (5453) Donald Trump (6811) Environment (5626) Europe (20428) Foreign Policy (5059) france (5287) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7418) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44694) politics (9748) russia (7781) Security (8036) Show Types (5934) Society (4197) sport (4209) Sports (8620) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22849) ukraine (6572) US Crime News (7444) US news (18089) US politics (26734) World (99434) World news (28919) worldNews (35837)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • The persistent notion that AI disruption could create a permanent underclass signals how much collateral damage AI companies might tolerate in pursuit of AGI (Jasmine Sun/New York Times) May 1, 2026
  • Oil rises as Trump faces crucial 60-day deadline for Iran war May 1, 2026
  • Condemnation and protests against Israel’s raid of Gaza aid flotilla May 1, 2026
  • Trump praises King Charles as the ‘greatest’ May 1, 2026
  • Sens. Kirsten Gillibrand and Dave McCormick introduce a bill banning members of the legislative and executive branches from trading on prediction markets (Jason Beeferman/Politico) May 1, 2026
  • ‘US Not At War With Iran’: Team Trump’s Big Claim As 60-Day Clock Stops Today May 1, 2026
  • Your TV can sound a lot better: 7 easy but unexpected ways to improve audio quality May 1, 2026

Categories Cloud

africa (4506) Americas (46444) AM Update (5047) Army (4680) Australia news (10496) Business (13928) China (6263) Culture (4478) cybersecurity (4285) Cyber Security (5056) Cyber Security News (5453) Donald Trump (6811) Environment (5626) Europe (20428) Foreign Policy (5059) france (5287) Hacking (8435) Health (4330) India (13677) Israel (6835) Mary Patriot News (4801) Media Wire (5804) middle east (7418) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (44694) politics (9748) russia (7781) Security (8036) Show Types (5934) Society (4197) sport (4209) Sports (8620) Tankers (5824) Technology (4755) Trump administration (4677) UK news (22849) ukraine (6572) US Crime News (7444) US news (18089) US politics (26734) World (99434) World news (28919) worldNews (35837)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive