Skip to content

February 26, 2026

  • Home
  • CySecGeneral
  • Members Login
  • Contact

MCYSEKA-Maritime Cyber Security Knowledge Archive

Global Cyber Security Educational Info Links – real-time news aggregation

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Security : Live
  • Hacking : Live
  • Malware : Live
  • Activity
  • OutPost : Archive
    • Maritime Archive
    • StayAware
      • US-Cert
      • DarkReading
      • KrebsonSecurity
      • PCMag
      • CIO
      • Wired
      • Schneier
      • Forbes
      • TechRepublic
      • ZDnet
      • hitb
      • ITSecurityGuru
      • itsecurity.co.uk
      • ThreatPost
      • DanKaminsky
      • EmergentChaos
      • FlyingPenguin
      • HackingArticles
    • CySecGeneral
      • Threatpost
      • Slashdot
      • InfosecIsland
      • Netcraft
      • Kali
      • RSA
      • MSR
      • CRN
      • MIT
  • Tags
    • Web Security
    • Vulnerabilities
    • Cybercrime
    • Mobile Security
    • Malware
    • Backdoor
    • Hacks
    • Encryption
    • Mobile
  • Interactive
    • Threat Cloud Check Point
    • FORTINET Threat Map
    • Kaspersky Cyberthreat Real-Time Map
    • Bitdefender
    • radware
  • Tools
    • Structured Data Sections
    • CySec Autobot
    • GlobalNews Autobot
    • Global Defense Autobot

Critical Microsoft Fixes Plummet in 2014 but Flaws Jump

February 6, 2015Comments Off on Critical Microsoft Fixes Plummet in 2014 but Flaws Jump

Redmond will continue packing more CVEs per bulletin in 2015, says Tripwire

Read More >>

Home Routers and IoT Devices Set to Drive DNS DDoS Attacks

February 6, 2015Comments Off on Home Routers and IoT Devices Set to Drive DNS DDoS Attacks

DNS-based attacks jumped 100-fold in 2014, according to Nominum

Read More >>

M-commerce Fraud Leading to Millions in Lost Revenue

February 6, 2015Comments Off on M-commerce Fraud Leading to Millions in Lost Revenue

Too many organizations are relying on existing e-commerce solutions instead of looking at mobile as a standalone honeypot of fraud.

Read More >>

Fake Voice Chat for Steam Gaming Serves Up Spyware

February 6, 2015Comments Off on Fake Voice Chat for Steam Gaming Serves Up Spyware

Russian hackers are using a faux version of the the Razer Comms voice chat service for PC gamers to spread malware.

Read More >>

Sony Pictures Breach Costs Movie Giant $15 Million

February 5, 2015Comments Off on Sony Pictures Breach Costs Movie Giant $15 Million

Investigation and remediation costs could be just the first of many

Read More >>

Facebook Porn Link Infects 110K in 2 Days

February 5, 2015Comments Off on Facebook Porn Link Infects 110K in 2 Days

A porn lure and a fake Flash update have dug in over at the social network.

Read More >>

Critroni Ransomware Masquerades as Google Chrome Update

February 4, 2015Comments Off on Critroni Ransomware Masquerades as Google Chrome Update

The continued success of ransomware in general indicates the need for new defensive techniques.

Read More >>

Two-Factor Authentication Set to Top $1.6Bn

February 4, 2015Comments Off on Two-Factor Authentication Set to Top $1.6Bn

Attacks exploiting weak passwords have created significant market demand for mobile user authentication.

Read More >>

Amateur Cyber-defenders Thwart ‘Attack’ on Major Multinational Corporation

February 3, 2015Comments Off on Amateur Cyber-defenders Thwart ‘Attack’ on Major Multinational Corporation

Testing the skills of the next generation of cyber-defenders was the central focus of PwC’s UK HQ cyber-forensics challenge.

Read More >>

Google Adds Research Grants to Bug Bounty Program

February 3, 2015Comments Off on Google Adds Research Grants to Bug Bounty Program

The experimental grant program pays researchers for their time, before they even discover a coding vulnerability.

Read More >>
1 … 97,315 97,316 97,317 97,318 97,319 … 97,774

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Hottest cybersecurity open-source tools of the month: February 2026 February 26, 2026
  • A Deal or War? Crucial Talks to Begin Between U.S. and Iran February 26, 2026
  • US government accused of major ‘cover-up’ over Trump sex abuse claims February 26, 2026
  • Jeff Galloway, who inspired people with his run-walk method, dies at 80 February 26, 2026
  • Australian PM apologises after calling child sex abuse survivor and advocate ‘difficult’ February 26, 2026
  • North Korea’s Kim Jong Un warns South Korea, says US should end hostility February 26, 2026
  • A Cloudflare engineer rebuilt Next.js from scratch in one week using AI, reimplementing 94% of its API and spending $1,100 on Claude tokens (Tim Anderson/The Register) February 26, 2026

Categories Cloud

africa (4144) Americas (43041) AM Update (4799) Army (4398) Australia news (9835) Business (12997) China (5893) Culture (4130) cybersecurity (3929) Cyber Security (4609) Cyber Security News (5021) Donald Trump (5955) Environment (5287) Europe (19132) Foreign Policy (4766) france (4869) Hacking (8080) Health (4004) India (12261) Israel (5534) Mary Patriot News (4801) Media Wire (5804) middle east (6506) Nation (11690) Nation, Nation & World (6413) Nation, World (11722) News (41720) politics (9013) russia (7391) Security (7319) Show Types (4656) Society (3849) Sports (8484) Tankers (5097) Technology (4342) Trump administration (4026) UK news (21045) ukraine (6356) Uncategorized (3860) US Crime News (7011) US news (16186) US politics (24466) World (91161) World news (27280) worldNews (32856)

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    

Recent Posts

  • Hottest cybersecurity open-source tools of the month: February 2026 February 26, 2026
  • A Deal or War? Crucial Talks to Begin Between U.S. and Iran February 26, 2026
  • US government accused of major ‘cover-up’ over Trump sex abuse claims February 26, 2026
  • Jeff Galloway, who inspired people with his run-walk method, dies at 80 February 26, 2026
  • Australian PM apologises after calling child sex abuse survivor and advocate ‘difficult’ February 26, 2026
  • North Korea’s Kim Jong Un warns South Korea, says US should end hostility February 26, 2026
  • A Cloudflare engineer rebuilt Next.js from scratch in one week using AI, reimplementing 94% of its API and spending $1,100 on Claude tokens (Tim Anderson/The Register) February 26, 2026

Categories Cloud

africa (4144) Americas (43041) AM Update (4799) Army (4398) Australia news (9835) Business (12997) China (5893) Culture (4130) cybersecurity (3929) Cyber Security (4609) Cyber Security News (5021) Donald Trump (5955) Environment (5287) Europe (19132) Foreign Policy (4766) france (4869) Hacking (8080) Health (4004) India (12261) Israel (5534) Mary Patriot News (4801) Media Wire (5804) middle east (6506) Nation (11690) Nation, Nation & World (6413) Nation, World (11722) News (41720) politics (9013) russia (7391) Security (7319) Show Types (4656) Society (3849) Sports (8484) Tankers (5097) Technology (4342) Trump administration (4026) UK news (21045) ukraine (6356) Uncategorized (3860) US Crime News (7011) US news (16186) US politics (24466) World (91161) World news (27280) worldNews (32856)

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Archives

February 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
232425262728  
« Jan    
  • Home
  • CySecGeneral
  • Members Login
  • Contact

© MCYSEKA-Maritime Cyber Security Knowledge Archive