Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

The Missing BlackBerry Of Dominique Strauss-Kahn

  • Post author:
  • Post last modified:November 28, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:7 mins read
  • Post published:November 28, 2011

Examples in which political news provide hints for Information Security are happening too often (think for instance to the UK…

Continue ReadingThe Missing BlackBerry Of Dominique Strauss-Kahn

Moving Security Model From Content To Context

  • Post author:
  • Post last modified:November 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:1 mins read
  • Post published:November 27, 2011

In these days I visited several customers to talk about technology trends for 2012. With the occasion I decided to…

Continue ReadingMoving Security Model From Content To Context

Mobile Antiviruses: Malware Scanners or Malware Scammers?

  • Post author:
  • Post last modified:November 23, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:November 23, 2011

Few days ago Juniper Networks has released a report on the status of Android Malware. The results are not encouraging…

Continue ReadingMobile Antiviruses: Malware Scanners or Malware Scammers?

Attacks Raining Down from the Clouds

  • Post author:
  • Post last modified:November 22, 2011
  • Post category:Cloud/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:November 22, 2011

Update November 24: New EU directive to feature cloud 'bridge'. The Binding Safe Processor Rules (BSPR) will ask cloud service…

Continue ReadingAttacks Raining Down from the Clouds

Advanced Persistent Threats and Human Errors

  • Post author:
  • Post last modified:November 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:November 20, 2011

In these days many people are asking me what they can do to stop an Advanced Persistent Threat. Although security…

Continue ReadingAdvanced Persistent Threats and Human Errors

November 2011 Cyber Attacks Timeline (Part I)

  • Post author:
  • Post last modified:November 17, 2011
  • Post category:Cyber Attacks Timelines/Cyberwar/Security
  • Post comments:5 Comments
  • Reading time:11 mins read
  • Post published:November 17, 2011

Update 12/01/2011: November Cyber Attacks Timeline (Part II) This first half of November has been very hard for Steam. The…

Continue ReadingNovember 2011 Cyber Attacks Timeline (Part I)

A New Hack to Italian Police? A fake!

  • Post author:
  • Post last modified:November 14, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:November 14, 2011

Here in Italy the news went almost unnoticed, but today Cyber War News reported about a new dump of data…

Continue ReadingA New Hack to Italian Police? A fake!

The China Cyber Attacks Syndrome

  • Post author:
  • Post last modified:November 11, 2011
  • Post category:Cyberwar/Security
  • Post comments:5 Comments
  • Reading time:4 mins read
  • Post published:November 11, 2011

A week ago, the Office of the National Counterintelligence Executive published a report to Congress concerning the use of cyber…

Continue ReadingThe China Cyber Attacks Syndrome

First Security Breach In The App Store

  • Post author:
  • Post last modified:November 8, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:November 8, 2011

It looks like the Judgment Day for iOS has finally arrived. Until today the robustness of the AppStore has always…

Continue ReadingFirst Security Breach In The App Store

Invasion Of The Facebook Snatchers

  • Post author:
  • Post last modified:November 5, 2011
  • Post category:Security/Social Networks
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:November 5, 2011

If you think that Facebook’s 600,000 compromised logins per day are not enough, you’d better read an interesting paper issued…

Continue ReadingInvasion Of The Facebook Snatchers
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 22
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM