Skip to content

February 10, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

August 8, 2014Comments Off on BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

Read More >>

BlackHat 2014: Square Launches Bug Bounty Program

August 8, 2014Comments Off on BlackHat 2014: Square Launches Bug Bounty Program

The program has paid $250-$1,500 per bug for uncovering card payment issues.

Read More >>

Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

August 8, 2014Comments Off on Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

Read More >>

FBI Used Drive-By-Downloads to Expose Tor Pedophiles

August 8, 2014Comments Off on FBI Used Drive-By-Downloads to Expose Tor Pedophiles

Controversial Operation Torpedo has come to light through released court documents.

Read More >>

BlackHat 2014: Airport Scanners Riddled with Security Flaws

August 8, 2014Comments Off on BlackHat 2014: Airport Scanners Riddled with Security Flaws

The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

Read More >>

WordPress Vulnerability Affects A Quarter of the Internet

August 7, 2014Comments Off on WordPress Vulnerability Affects A Quarter of the Internet

The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

Read More >>

John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

August 7, 2014Comments Off on John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

Read More >>

NSS Launches Cyber Resiliency Center

August 7, 2014Comments Off on NSS Launches Cyber Resiliency Center

The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.

Read More >>

Black Hat 2014 Keynote: What InfoSec Needs to Do

August 7, 2014Comments Off on Black Hat 2014 Keynote: What InfoSec Needs to Do

Security visionary Dan Geer laid out recommendations and observations for the information security industry in his keynote speech for the Black Hat security conference on Wednesday.

Read More >>

Google’s Gmail Scanning Leads to Arrest of Convicted Child Sex Offender

August 6, 2014Comments Off on Google’s Gmail Scanning Leads to Arrest of Convicted Child Sex Offender

Web giant claims it doesn’t scan for any other signs of illegal activity.

Read More >>
1 … 95,519 95,520 95,521 95,522 95,523 … 95,938

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Your PC’s critical security certificates may be about to expire – how to check February 10, 2026
  • When Drought Steals Childhood: How Climate Shocks in Northern Kenya Are Testing the SDGs February 10, 2026
  • This lightweight Linux distro I tried can run on older machines – but looks modern February 10, 2026
  • Discord’s age verification lockdown: What to know, and alternatives users are considering February 10, 2026
  • Netanyahu heads to Washington to meet Trump with Iran missiles high on agenda February 10, 2026
  • Milano Cortina Olympics: Row over medal quality February 10, 2026
  • ‘Don’t jump in them’: Olympic athletes’ medals break during celebrations February 10, 2026

Categories Cloud

africa (4073) Americas (42151) AM Update (4742) Army (4333) Australia news (9666) Business (12722) China (5790) Culture (4029) cybersecurity (3855) Cyber Security (4518) Cyber Security News (4933) Donald Trump (5799) Environment (5203) Europe (18703) Foreign Policy (4679) france (4674) Hacking (7996) Health (3922) India (11836) Israel (5450) Mary Patriot News (4801) Media Wire (5804) middle east (6417) Nation (11455) Nation, Nation & World (6270) Nation, World (11477) News (40951) politics (8838) russia (7282) Security (7176) Show Types (4452) Society (3766) Sports (8433) Tankers (4953) Technology (4218) Trump administration (3869) UK news (20583) ukraine (6278) Uncategorized (3833) US Crime News (6887) US news (15715) US politics (23924) World (89168) World news (26884) worldNews (32132)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Your PC’s critical security certificates may be about to expire – how to check February 10, 2026
  • When Drought Steals Childhood: How Climate Shocks in Northern Kenya Are Testing the SDGs February 10, 2026
  • This lightweight Linux distro I tried can run on older machines – but looks modern February 10, 2026
  • Discord’s age verification lockdown: What to know, and alternatives users are considering February 10, 2026
  • Netanyahu heads to Washington to meet Trump with Iran missiles high on agenda February 10, 2026
  • Milano Cortina Olympics: Row over medal quality February 10, 2026
  • ‘Don’t jump in them’: Olympic athletes’ medals break during celebrations February 10, 2026

Categories Cloud

africa (4073) Americas (42151) AM Update (4742) Army (4333) Australia news (9666) Business (12722) China (5790) Culture (4029) cybersecurity (3855) Cyber Security (4518) Cyber Security News (4933) Donald Trump (5799) Environment (5203) Europe (18703) Foreign Policy (4679) france (4674) Hacking (7996) Health (3922) India (11836) Israel (5450) Mary Patriot News (4801) Media Wire (5804) middle east (6417) Nation (11455) Nation, Nation & World (6270) Nation, World (11477) News (40951) politics (8838) russia (7282) Security (7176) Show Types (4452) Society (3766) Sports (8433) Tankers (4953) Technology (4218) Trump administration (3869) UK news (20583) ukraine (6278) Uncategorized (3833) US Crime News (6887) US news (15715) US politics (23924) World (89168) World news (26884) worldNews (32132)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive