Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Again On The Carrier IQ Saga

  • Post author:
  • Post last modified:December 13, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:December 13, 2011

Yesterday I posted evidence about the presence of the infamous Carrier IQ Software in Italy. Today another episode (I presume…

Continue ReadingAgain On The Carrier IQ Saga

Breaking: First Known Detection of Carrier IQ in Italy

  • Post author:
  • Post last modified:December 12, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:December 12, 2011

Update December 13: Carrier IQ issued an updated statement, new concerns for an endless saga... I am proud to post…

Continue ReadingBreaking: First Known Detection of Carrier IQ in Italy

Mobile Antiviruses: Malware Scanners or Malware Scammers?

  • Post author:
  • Post last modified:November 23, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:November 23, 2011

Few days ago Juniper Networks has released a report on the status of Android Malware. The results are not encouraging…

Continue ReadingMobile Antiviruses: Malware Scanners or Malware Scammers?

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:17 mins read
  • Post published:August 22, 2011

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue ReadingThe Dangerous Liaisons (Updated)

Looking Inside a Year of Android Malware

  • Post author:
  • Post last modified:August 14, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:8 mins read
  • Post published:August 14, 2011

As you will probably know my Birthday post for Android Malware has deserved a mention from Engadget and Wired. Easily…

Continue ReadingLooking Inside a Year of Android Malware

One Year Of Android Malware (Full List)

  • Post author:
  • Post last modified:August 11, 2011
  • Post category:Mobile/Security
  • Post comments:30 Comments
  • Reading time:57 mins read
  • Post published:August 11, 2011

Update August 14: After the list (and the subsequent turmoil) here is the Look Inside a Year Of Android Malware.…

Continue ReadingOne Year Of Android Malware (Full List)

Happy Birthday! One Year of Android Malware

  • Post author:
  • Post last modified:August 9, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:27 mins read
  • Post published:August 9, 2011

Exactly One year ago (9 August 2010) Kaspersky discovered the first SMS Trojan for Android in the Wild dubbed SMS.AndroidOS.FakePlayer.a.…

Continue ReadingHappy Birthday! One Year of Android Malware

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:July 15, 2011

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue ReadingPhonarchy in the U.K.

Home Made Mobile Warfare

  • Post author:
  • Post last modified:June 26, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 26, 2011

David has shown me another example of the strict connection between real warfare and mobile warfare come from Afghanistan. Few…

Continue ReadingHome Made Mobile Warfare

Switch Off The Revolution (With An Infrared Sensor)

  • Post author:
  • Post last modified:June 23, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:June 23, 2011

Just a couple of months ago, in writing the first post about Mobile Warfare (which should have later become Consumerization…

Continue ReadingSwitch Off The Revolution (With An Infrared Sensor)
  • 1
  • 2
  • 3
  • 4
  • …
  • 7
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM