Skip to content

February 23, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Intergrity and honesty top list of most important federal government cybersecurity skills

February 18, 2011Comments Off on Intergrity and honesty top list of most important federal government cybersecurity skills

Integrity and honesty top the list of skills needed for the current and future federal cybersecurity workforce, according to an Office of Personnel Management (OPM) survey.

Read More >>

End-of-life IT assets pose serious security risk to most firms

February 18, 2011Comments Off on End-of-life IT assets pose serious security risk to most firms

Research just published claims that end-of-life IT assets – especially portable devices like smartphones and laptops – pose a serious data security threat to many firms.

Read More >>

Pharmacy spam campaign hijacks Google brand name

February 18, 2011Comments Off on Pharmacy spam campaign hijacks Google brand name

A new pharma spam campaign uses the Google brand. More than 250 similar blog-related campaigns have been tracked in the last two days.

Read More >>

West Virginia hospital exposed personal data on 3,655 patients

February 17, 2011Comments Off on West Virginia hospital exposed personal data on 3,655 patients

The West Virginia Attorney General’s Office announced that personal information of 3,655 patients at the Charleston Area Medical Center (CAMC) was placed onto a publicly available website.

Read More >>

RSA 2011: Application whitelisting comes to the consumer

February 17, 2011Comments Off on RSA 2011: Application whitelisting comes to the consumer

Application whitelisting technology is hardly a novel concept – in fact, the technology has been available to enterprises for some years now. But, as GlobalSCAPE executives told Infosecurity at this year’s RSA Conference in San Francisco, application w…

Read More >>

BBC 6 Music and 1Xtra websites infected by Phoenix exploit kit hack

February 17, 2011Comments Off on BBC 6 Music and 1Xtra websites infected by Phoenix exploit kit hack

Visitors to two websites operated by the BBC were injected by malicious code earlier this week, opening up users to attacks by hackers, claims Websense.

Read More >>

Lumension releases beta version of its Application Scanner v2.0

February 17, 2011Comments Off on Lumension releases beta version of its Application Scanner v2.0

Lumension has released a beta version of its free Application Scanner v2.0 that scans executable files and identifies all applications within the endpoint environment, along with its Endpoint Intelligence Center (EIC) that consolidates malware, vulnera…

Read More >>

RSA: Fake AV Companies Making More Money than Security Vendors

February 17, 2011Comments Off on RSA: Fake AV Companies Making More Money than Security Vendors

Having spoken on the ‘Public, meet private: Lessons learned in chasing cyber crooks’ panel at the RSA 2011 conference in San Francisco, Pedro Bustamante, senior research analyst at Panda Security, tells Infosecurity’s Eleanor Dallaway why geography is …

Read More >>

Education programs are hardly a security ‘silver bullet’

February 16, 2011Comments Off on Education programs are hardly a security ‘silver bullet’

User education is often touted as a cornerstone of any effective IT security program. But as Jack Daniel, community development manager with internet security firm Astaro contends, not every organization will reap benefits from educating its end-users.

Read More >>

RSA 2011: Terrorist groups pose most dangerous cyber threat

February 16, 2011Comments Off on RSA 2011: Terrorist groups pose most dangerous cyber threat

While nation-states actively attempt to exploit the networks of the US government, critical infrastructure, and commercial networks, US Deputy Secretary of Defense William Lynn told the RSA Conference audience that terrorist groups are inevitably more …

Read More >>
1 … 97,237 97,238 97,239 97,240 97,241 … 97,383

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • A thought experiment imagines the AI-driven “2028 Global Intelligence Crisis”: S&P down, high unemployment, and economy failing, as AI exceeds every expectation (Citrini Research) February 23, 2026
  • UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment February 23, 2026
  • Bizarre texts reveal gun-wielding man, 21, who broke into Trump’s Mar-a-Lago resort ‘was obsessed with Epstein files’ February 23, 2026
  • How Buddy Rizer, an official in Virginia’s Loudoun County, helped build the world’s largest data center market, with ~200 buildings spanning ~49M square feet (David Uberti/Wall Street Journal) February 23, 2026
  • New Dutch minority government sworn in under centrist Prime Minister Rob Jetten February 23, 2026
  • Chilling signs Iran will order allies to unleash terror on West if Trump strikes as Ayatollah draws up doomsday plan February 23, 2026
  • ‘Love doesn’t die with death’: How four years of war have reshaped relationships in Ukraine February 23, 2026

Categories Cloud

africa (4127) Americas (42839) AM Update (4785) Army (4384) Australia news (9793) Business (12928) China (5876) Culture (4110) cybersecurity (3908) Cyber Security (4593) Cyber Security News (5007) Donald Trump (5910) Environment (5271) Europe (19044) Foreign Policy (4748) france (4841) Hacking (8062) Health (3986) India (12187) Israel (5511) Mary Patriot News (4801) Media Wire (5804) middle east (6489) Nation (11636) Nation, Nation & World (6379) Nation, World (11673) News (41554) politics (8983) russia (7368) Security (7283) Show Types (4603) Society (3832) Sports (8477) Tankers (5062) Technology (4312) Trump administration (3996) UK news (20946) ukraine (6337) Uncategorized (3855) US Crime News (6985) US news (16073) US politics (24347) World (90716) World news (27196) worldNews (32729)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • A thought experiment imagines the AI-driven “2028 Global Intelligence Crisis”: S&P down, high unemployment, and economy failing, as AI exceeds every expectation (Citrini Research) February 23, 2026
  • UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment February 23, 2026
  • Bizarre texts reveal gun-wielding man, 21, who broke into Trump’s Mar-a-Lago resort ‘was obsessed with Epstein files’ February 23, 2026
  • How Buddy Rizer, an official in Virginia’s Loudoun County, helped build the world’s largest data center market, with ~200 buildings spanning ~49M square feet (David Uberti/Wall Street Journal) February 23, 2026
  • New Dutch minority government sworn in under centrist Prime Minister Rob Jetten February 23, 2026
  • Chilling signs Iran will order allies to unleash terror on West if Trump strikes as Ayatollah draws up doomsday plan February 23, 2026
  • ‘Love doesn’t die with death’: How four years of war have reshaped relationships in Ukraine February 23, 2026

Categories Cloud

africa (4127) Americas (42839) AM Update (4785) Army (4384) Australia news (9793) Business (12928) China (5876) Culture (4110) cybersecurity (3908) Cyber Security (4593) Cyber Security News (5007) Donald Trump (5910) Environment (5271) Europe (19044) Foreign Policy (4748) france (4841) Hacking (8062) Health (3986) India (12187) Israel (5511) Mary Patriot News (4801) Media Wire (5804) middle east (6489) Nation (11636) Nation, Nation & World (6379) Nation, World (11673) News (41554) politics (8983) russia (7368) Security (7283) Show Types (4603) Society (3832) Sports (8477) Tankers (5062) Technology (4312) Trump administration (3996) UK news (20946) ukraine (6337) Uncategorized (3855) US Crime News (6985) US news (16073) US politics (24347) World (90716) World news (27196) worldNews (32729)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive