Skip to content

February 16, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Destructive BlackEnergy Attacks Blitz Ukrainian News and Energy Firms

January 4, 2016Comments Off on Destructive BlackEnergy Attacks Blitz Ukrainian News and Energy Firms

Hacking team had a busy 2015, according to Eset

Read More >>

APAC Industrial Control Security Market to Top $1 Billion

December 23, 2015Comments Off on APAC Industrial Control Security Market to Top $1 Billion

New report claims firms are beginning to understand the threat to ICS

Read More >>

Center for Internet Security Releases Companion Guides

December 23, 2015Comments Off on Center for Internet Security Releases Companion Guides

The CIS Controls are a recommended set of actions to stop today’s most pervasive and dangerous cybersecurity attacks.

Read More >>

IoT, Virtual Architecture to Dominate Cloud Security in 2016

December 22, 2015Comments Off on IoT, Virtual Architecture to Dominate Cloud Security in 2016

The cloud represents several emerging attack vectors that IT departments and everyday users should be considering now.

Read More >>

Panda Security: New Malware Hit 230,000 Per Day in 2015

December 22, 2015Comments Off on Panda Security: New Malware Hit 230,000 Per Day in 2015

Vendor predicts JavaScript and PowerShell attacks could be on the rise

Read More >>

Foreign Hackers Infiltrate US Power Grid – Report

December 22, 2015Comments Off on Foreign Hackers Infiltrate US Power Grid – Report

Iranian attackers stole top secret plans

Read More >>

US Congress Passes Controversial Info-Sharing Bill

December 21, 2015Comments Off on US Congress Passes Controversial Info-Sharing Bill

After more than five years of debate. The Cybersecurity Act of 2015 was passed as part of the Omnibus Spending Bill.

Read More >>

Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones

December 21, 2015Comments Off on Cyber-Bonanza: 80% of Android Users Have Outdated Smartphones

With 6,400 new instances of malware targeting Android devices every day in the third quarter, phones that aren’t updated offer a big attack vector.

Read More >>

Hello Kitty, Goodbye Privacy as 3M+ Users Hit by Breach

December 21, 2015Comments Off on Hello Kitty, Goodbye Privacy as 3M+ Users Hit by Breach

Another MongoDB issue leads to exposure of personal data online

Read More >>

Facebook Shuns Buggy Flash in Favor of HTML5

December 21, 2015Comments Off on Facebook Shuns Buggy Flash in Favor of HTML5

Changes shipped to all browsers by default

Read More >>
1 … 96,093 96,094 96,095 96,096 96,097 … 96,629

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Driven by money, pushed by passion: Migrant tea pickers of Kerala, India February 16, 2026
  • Generic Router Security Measures February 16, 2026
  • Iran Holds Exercises in Strait of Hormuz After Trump Threatens Military Action February 16, 2026
  • Business and limbs destroyed by Israel, Gaza family rebuilds bakery February 16, 2026
  • User Issues With X Appear to Have Resolved February 16, 2026
  • Is there such a thing as bad publicity? At the Olympics, curling is finding out … probably not February 16, 2026
  • Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords February 16, 2026

Categories Cloud

africa (4099) Americas (42478) AM Update (4764) Army (4355) Australia news (9726) Business (12809) China (5837) Culture (4061) Cyber Security (4557) cybersecurity (3880) Cyber Security News (4970) Donald Trump (5846) Environment (5235) Europe (18889) Foreign Policy (4720) france (4745) Hacking (8028) Health (3953) India (12005) Israel (5478) Mary Patriot News (4801) Media Wire (5804) middle east (6444) Nation (11541) Nation, Nation & World (6319) Nation, World (11581) News (41224) politics (8915) russia (7331) Security (7217) Show Types (4523) Society (3799) Sports (8452) Tankers (5005) Technology (4260) Trump administration (3932) UK news (20767) ukraine (6310) Uncategorized (3848) US Crime News (6932) US news (15897) US politics (24124) World (89884) World news (27048) worldNews (32399)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Driven by money, pushed by passion: Migrant tea pickers of Kerala, India February 16, 2026
  • Generic Router Security Measures February 16, 2026
  • Iran Holds Exercises in Strait of Hormuz After Trump Threatens Military Action February 16, 2026
  • Business and limbs destroyed by Israel, Gaza family rebuilds bakery February 16, 2026
  • User Issues With X Appear to Have Resolved February 16, 2026
  • Is there such a thing as bad publicity? At the Olympics, curling is finding out … probably not February 16, 2026
  • Vulnerabilities in Password Managers Allow Hackers to View and Change Passwords February 16, 2026

Categories Cloud

africa (4099) Americas (42478) AM Update (4764) Army (4355) Australia news (9726) Business (12809) China (5837) Culture (4061) Cyber Security (4557) cybersecurity (3880) Cyber Security News (4970) Donald Trump (5846) Environment (5235) Europe (18889) Foreign Policy (4720) france (4745) Hacking (8028) Health (3953) India (12005) Israel (5478) Mary Patriot News (4801) Media Wire (5804) middle east (6444) Nation (11541) Nation, Nation & World (6319) Nation, World (11581) News (41224) politics (8915) russia (7331) Security (7217) Show Types (4523) Society (3799) Sports (8452) Tankers (5005) Technology (4260) Trump administration (3932) UK news (20767) ukraine (6310) Uncategorized (3848) US Crime News (6932) US news (15897) US politics (24124) World (89884) World news (27048) worldNews (32399)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive