Skip to content

February 17, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

August 8, 2014Comments Off on Sophisticated Spy Campaign Targets Former Eastern Bloc Countries

Espionage malware has persisted in embassies and state offices for at least four years.

Read More >>

BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

August 8, 2014Comments Off on BlackHat 2014: Mobile Point of Sale Devices at Risk from Hackers

Hackers can take over mobile point of sale devices through various means, including inserting a maliciously crafted card.

Read More >>

BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

August 8, 2014Comments Off on BlackHat 2014: Medical Device Security Not as High Risk as Previously Claimed

While it’s true that medical devices are vulnerable and can be tampered with, these attacks are still in the realm of unlikelyhood.

Read More >>

BlackHat 2014: Square Launches Bug Bounty Program

August 8, 2014Comments Off on BlackHat 2014: Square Launches Bug Bounty Program

The program has paid $250-$1,500 per bug for uncovering card payment issues.

Read More >>

Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

August 8, 2014Comments Off on Google Gives HTTPS a Helping Hand by Demoting Insecure Sites

Web giant will use the secure protocol as a ‘signal’ in search ranking algorithm

Read More >>

FBI Used Drive-By-Downloads to Expose Tor Pedophiles

August 8, 2014Comments Off on FBI Used Drive-By-Downloads to Expose Tor Pedophiles

Controversial Operation Torpedo has come to light through released court documents.

Read More >>

BlackHat 2014: Airport Scanners Riddled with Security Flaws

August 8, 2014Comments Off on BlackHat 2014: Airport Scanners Riddled with Security Flaws

The scanners used by many airports in the United States are riddled with security flaws, a security researcher told attendees at the Black Hat conference in Las Vegas Wednesday.

Read More >>

WordPress Vulnerability Affects A Quarter of the Internet

August 7, 2014Comments Off on WordPress Vulnerability Affects A Quarter of the Internet

The wide-net bug paves the way for massive DDoS attacks that can’t be mitigated by normal security measures.

Read More >>

John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

August 7, 2014Comments Off on John McAfee: Google and Facebook’s Erosion of Privacy is a Tragedy

AV founder calls on users to take a stand against apps which are chipping away at personal freedoms.

Read More >>

NSS Launches Cyber Resiliency Center

August 7, 2014Comments Off on NSS Launches Cyber Resiliency Center

The SaaS tool runs “what if?” scenarios that model a given environment’s deployed security layers, to show which threats are able to exploit their attack surface.

Read More >>
1 … 96,292 96,293 96,294 96,295 96,296 … 96,711

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Side-Channel Attacks Against LLMs February 17, 2026
  • Epstein kept plants that produce terrifying untraceable ‘zombie drug’ known to block victim’s free-will, files suggest February 17, 2026
  • Who is Reverend Jesse Jackson’s wife Jacqueline and how many children did couple have? February 17, 2026
  • Former Trump strategist defends ties with Epstein February 17, 2026
  • Ukraine should come to the table ‘fast’ – Trump February 17, 2026
  • Third round of Russia-Ukraine talks to take place as strikes continue February 17, 2026
  • Shein faces EU investigation over illegal products and addictive design features February 17, 2026

Categories Cloud

africa (4101) Americas (42516) AM Update (4764) Army (4358) Australia news (9738) Business (12825) China (5839) Culture (4068) Cyber Security (4564) cybersecurity (3884) Cyber Security News (4977) Donald Trump (5850) Environment (5238) Europe (18913) Foreign Policy (4726) france (4752) Hacking (8033) Health (3957) India (12024) Israel (5480) Mary Patriot News (4801) Media Wire (5804) middle east (6448) Nation (11546) Nation, Nation & World (6332) Nation, World (11592) News (41261) politics (8923) russia (7338) Security (7231) Show Types (4530) Society (3804) Sports (8454) Tankers (5008) Technology (4264) Trump administration (3935) UK news (20789) ukraine (6314) Uncategorized (3849) US Crime News (6936) US news (15911) US politics (24147) World (89978) World news (27069) worldNews (32432)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Side-Channel Attacks Against LLMs February 17, 2026
  • Epstein kept plants that produce terrifying untraceable ‘zombie drug’ known to block victim’s free-will, files suggest February 17, 2026
  • Who is Reverend Jesse Jackson’s wife Jacqueline and how many children did couple have? February 17, 2026
  • Former Trump strategist defends ties with Epstein February 17, 2026
  • Ukraine should come to the table ‘fast’ – Trump February 17, 2026
  • Third round of Russia-Ukraine talks to take place as strikes continue February 17, 2026
  • Shein faces EU investigation over illegal products and addictive design features February 17, 2026

Categories Cloud

africa (4101) Americas (42516) AM Update (4764) Army (4358) Australia news (9738) Business (12825) China (5839) Culture (4068) Cyber Security (4564) cybersecurity (3884) Cyber Security News (4977) Donald Trump (5850) Environment (5238) Europe (18913) Foreign Policy (4726) france (4752) Hacking (8033) Health (3957) India (12024) Israel (5480) Mary Patriot News (4801) Media Wire (5804) middle east (6448) Nation (11546) Nation, Nation & World (6332) Nation, World (11592) News (41261) politics (8923) russia (7338) Security (7231) Show Types (4530) Society (3804) Sports (8454) Tankers (5008) Technology (4264) Trump administration (3935) UK news (20789) ukraine (6314) Uncategorized (3849) US Crime News (6936) US news (15911) US politics (24147) World (89978) World news (27069) worldNews (32432)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive