Skip to content

May 15, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Research claims email no longer the main source of e-discovery requests

September 19, 2011Comments Off on Research claims email no longer the main source of e-discovery requests

Research just released by Symantec claims to show that email is no longer the primary source of information for legal e-discovery requests, meaning that firms must now be prepared to produce information from more sources than ever before.

Read More >>

Trusteer says Zeus’ arrival as number two malware threat direct result of May source code leaks

September 19, 2011Comments Off on Trusteer says Zeus’ arrival as number two malware threat direct result of May source code leaks

Fortinet’s report of earlier in the month – showing that the infamous Zeus malware as having shot to the number two spot in the malware charts – comes as no surprise, says in-browser security specialist Trusteer.

Read More >>

Analyst spots major changes in Android DroidDream malware

September 19, 2011Comments Off on Analyst spots major changes in Android DroidDream malware

It looks like the DroidDream malware – which infected hundreds of thousands of Android users earlier in the year – is back with a sting in the tail, as a Trend Micro threat analyst is reporting that a major recode has been spotted.

Read More >>

Analyst spots major changes in Android DroidDream malware

September 19, 2011Comments Off on Analyst spots major changes in Android DroidDream malware

It looks like the DroidDream malware – which infected hundreds of thousands of Android users earlier in the year – is back with a sting in the tail, as a Trend Micro threat analyst is reporting that a major recode has been spotted.

Read More >>

FBI probes over 400 cases of corporate bank account cyberjacking

September 16, 2011Comments Off on FBI probes over 400 cases of corporate bank account cyberjacking

The FBI is currently investigating over 400 reported cases of corporate banking account takeovers in which cybercriminals have initiated unauthorized automated clearing house (ACH) and wire transfers from US-based organizations, an FBI official told a …

Read More >>

FBI probes over 400 cases of corporate bank account cyberjacking

September 16, 2011Comments Off on FBI probes over 400 cases of corporate bank account cyberjacking

The FBI is currently investigating over 400 reported cases of corporate banking account takeovers in which cybercriminals have initiated unauthorized automated clearing house (ACH) and wire transfers from US-based organizations, an FBI official told a …

Read More >>

Rogue trader who cost UBS £1.3bn highlights failure to monitor unauthorized dealing

September 16, 2011Comments Off on Rogue trader who cost UBS £1.3bn highlights failure to monitor unauthorized dealing

Another case of the unauthorized activity of a trader at an investment bank has highlighted the need for real-time monitoring and control in the investment banking sector.

Read More >>

Hackers flip over Unicode trick

September 15, 2011Comments Off on Hackers flip over Unicode trick

Hackers are flipping filenames to create apparently ‘safe’ file extensions that in fact contain malware, according to Czech security firm Avast Software.

Read More >>

Kaspersky senior researcher predicts further DigiNotar-style hacks

September 15, 2011Comments Off on Kaspersky senior researcher predicts further DigiNotar-style hacks

Roel Schouwenberg, a senior security researcher with Kaspersky Lab, is advising internet users to exercise extreme caution when dealing with online certificates in the wake of the DigiNotar certificate authority (CA) systems hack.

Read More >>

Lessons from campus are fundamental to managing consumerization of IT

September 14, 2011Comments Off on Lessons from campus are fundamental to managing consumerization of IT

The consumerization of IT is one of the hottest trends of late, leaving many ITsec pros wondering how they can balance the demands of their users with the security of their enterprise networks. It appears that one successful model has been under our no…

Read More >>
1 … 106,048 106,049 106,050 106,051 106,052 … 106,252

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Google Project Zero Details Pixel 10 Zero-Click Exploit Chain May 15, 2026
  • Trump told Xi ‘I don’t talk about’ whether U.S. would defend Taiwan from China May 15, 2026
  • Iran says it “cannot trust” U.S. in negotiations as Trump says “we control” strait May 15, 2026
  • I tested Bose’s Lifestyle Ultra soundbar, and it raised the ‘too much bass’ debate in my home May 15, 2026
  • I tested Bose’s new smart speaker beside my Sonos Era 100 – it was better in several ways May 15, 2026
  • PraisonAI Vulnerability Actively Exploited Within Hours of Being Made Public May 15, 2026
  • Lonely pensioner tricked out of £7,500 thinking she was in a relationship with James Blunt after year-long AI love con May 15, 2026

Categories Cloud

africa (4601) Americas (47198) AM Update (5105) Army (4766) Australia news (10649) Business (14114) China (6472) Culture (4592) Cyber Security (5160) cybersecurity (4362) Cyber Security News (5555) Donald Trump (6947) Environment (5709) Europe (20802) Foreign Policy (5113) france (5369) Hacking (8514) Health (4426) India (14035) Israel (6957) Mary Patriot News (4801) Media Wire (5804) middle east (7537) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45361) politics (9940) russia (7862) Security (8192) Show Types (6162) Society (4264) sport (4364) Sports (8646) Tankers (5959) Technology (4841) Trump administration (4803) UK news (23273) ukraine (6633) US Crime News (7549) US news (18493) US politics (27205) World (101146) World news (29249) worldNews (36471)

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Recent Posts

  • Google Project Zero Details Pixel 10 Zero-Click Exploit Chain May 15, 2026
  • Trump told Xi ‘I don’t talk about’ whether U.S. would defend Taiwan from China May 15, 2026
  • Iran says it “cannot trust” U.S. in negotiations as Trump says “we control” strait May 15, 2026
  • I tested Bose’s Lifestyle Ultra soundbar, and it raised the ‘too much bass’ debate in my home May 15, 2026
  • I tested Bose’s new smart speaker beside my Sonos Era 100 – it was better in several ways May 15, 2026
  • PraisonAI Vulnerability Actively Exploited Within Hours of Being Made Public May 15, 2026
  • Lonely pensioner tricked out of £7,500 thinking she was in a relationship with James Blunt after year-long AI love con May 15, 2026

Categories Cloud

africa (4601) Americas (47198) AM Update (5105) Army (4766) Australia news (10649) Business (14114) China (6472) Culture (4592) Cyber Security (5160) cybersecurity (4362) Cyber Security News (5555) Donald Trump (6947) Environment (5709) Europe (20802) Foreign Policy (5113) france (5369) Hacking (8514) Health (4426) India (14035) Israel (6957) Mary Patriot News (4801) Media Wire (5804) middle east (7537) Nation (11970) Nation, Nation & World (6588) Nation, World (11947) News (45361) politics (9940) russia (7862) Security (8192) Show Types (6162) Society (4264) sport (4364) Sports (8646) Tankers (5959) Technology (4841) Trump administration (4803) UK news (23273) ukraine (6633) US Crime News (7549) US news (18493) US politics (27205) World (101146) World news (29249) worldNews (36471)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive