Skip to content

February 14, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

UK SMBs Failing to Manage Ex-Employee Risk

August 14, 2014Comments Off on UK SMBs Failing to Manage Ex-Employee Risk

Staff frequently take passwords with them and store business files in personal cloud services, says Intermedia.

Read More >>

Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

August 13, 2014Comments Off on Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

Attackers can use a file-sharing feature to access confidential info or serve targeted malware.

Read More >>

Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

August 13, 2014Comments Off on Blackberry Z10 Authentication Bypass Opens Remote Access to Hackers

Attackers can use a file-sharing feature to access confidential info or serve targeted malware.

Read More >>

Malware No Longer Avoids Virtual Machines

August 13, 2014Comments Off on Malware No Longer Avoids Virtual Machines

Most enterprises are implementing virtualization, so malware authors are learning to write their code to attack that infrastructure more effectively.

Read More >>

Android RAT Krysanec Masquerades as Legit Apps

August 13, 2014Comments Off on Android RAT Krysanec Masquerades as Legit Apps

Undetected, the bug sets up a backdoor to siphon off all kinds of personal information.

Read More >>

LastPass Users Left in the Lurch After Massive Outage

August 13, 2014Comments Off on LastPass Users Left in the Lurch After Massive Outage

Datacenter downer as firms are left unable to access key online accounts

Read More >>

Chinese Heart App Virus Slams 100,000 Android Phones

August 13, 2014Comments Off on Chinese Heart App Virus Slams 100,000 Android Phones

Malware written by software student spreads like wildfire in the Middle Kingdom.

Read More >>

2014 So Far: The Year of the Data Breach

August 12, 2014Comments Off on 2014 So Far: The Year of the Data Breach

Attacks are intensifying, and have already claimed 10 million personal records.

Read More >>

SecureAuth Adds Risk-based Authentication Scheme

August 12, 2014Comments Off on SecureAuth Adds Risk-based Authentication Scheme

Latest stab at “post-password” security adds live threat intelligence to the mix.

Read More >>

Xiaomi Issues Update After Data Privacy Concerns

August 12, 2014Comments Off on Xiaomi Issues Update After Data Privacy Concerns

MIUI Cloud Messaging made opt-in after negative feedback.

Read More >>
1 … 95,991 95,992 95,993 95,994 95,995 … 96,411

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Indian national admits role in US Sikh leader’s assassination plot February 14, 2026
  • LIVE: World leaders gather in Munich for 2nd day of security conference February 14, 2026
  • In upcoming elections, Republicans have a Texas problem — and so do Democrats February 14, 2026
  • US ends temporary protected status for Yemeni refugees, asylum seekers February 14, 2026
  • What’s next for Cuba? Trump turns the screws as the island runs out of jet fuel February 14, 2026
  • It’s been a big — but rocky — week for AI models from China. Here’s what’s happened February 14, 2026
  • Trump says Iran regime change ‘best thing that could happen’ as second carrier heads to region February 14, 2026

Categories Cloud

africa (4087) Americas (42406) AM Update (4756) Army (4353) Australia news (9700) Business (12787) China (5822) Culture (4052) Cyber Security (4547) cybersecurity (3875) Cyber Security News (4960) Donald Trump (5834) Environment (5226) Europe (18828) Foreign Policy (4708) france (4716) Hacking (8015) Health (3943) India (11961) Israel (5471) Mary Patriot News (4801) Media Wire (5804) middle east (6433) Nation (11526) Nation, Nation & World (6315) Nation, World (11555) News (41147) politics (8887) russia (7315) Security (7203) Show Types (4499) Society (3791) Sports (8445) Tankers (4993) Technology (4251) Trump administration (3918) UK news (20703) ukraine (6297) Uncategorized (3845) US Crime News (6918) US news (15847) US politics (24080) World (89661) World news (26992) worldNews (32285)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Indian national admits role in US Sikh leader’s assassination plot February 14, 2026
  • LIVE: World leaders gather in Munich for 2nd day of security conference February 14, 2026
  • In upcoming elections, Republicans have a Texas problem — and so do Democrats February 14, 2026
  • US ends temporary protected status for Yemeni refugees, asylum seekers February 14, 2026
  • What’s next for Cuba? Trump turns the screws as the island runs out of jet fuel February 14, 2026
  • It’s been a big — but rocky — week for AI models from China. Here’s what’s happened February 14, 2026
  • Trump says Iran regime change ‘best thing that could happen’ as second carrier heads to region February 14, 2026

Categories Cloud

africa (4087) Americas (42406) AM Update (4756) Army (4353) Australia news (9700) Business (12787) China (5822) Culture (4052) Cyber Security (4547) cybersecurity (3875) Cyber Security News (4960) Donald Trump (5834) Environment (5226) Europe (18828) Foreign Policy (4708) france (4716) Hacking (8015) Health (3943) India (11961) Israel (5471) Mary Patriot News (4801) Media Wire (5804) middle east (6433) Nation (11526) Nation, Nation & World (6315) Nation, World (11555) News (41147) politics (8887) russia (7315) Security (7203) Show Types (4499) Society (3791) Sports (8445) Tankers (4993) Technology (4251) Trump administration (3918) UK news (20703) ukraine (6297) Uncategorized (3845) US Crime News (6918) US news (15847) US politics (24080) World (89661) World news (26992) worldNews (32285)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive