Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

When Angry Birds eat Plankton

  • Post author:
  • Post last modified:June 14, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:3 mins read
  • Post published:June 14, 2011

What happens when Angry Birds eat Plankton? Simple: they get Sick Birds, go to the Android Market and infect more…

Continue ReadingWhen Angry Birds eat Plankton

Sometimes They Come Back

  • Post author:
  • Post last modified:June 6, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:June 6, 2011

Not even a week after the light version of DroidDream, a new nightmare rises from the Android Market to menace…

Continue ReadingSometimes They Come Back

DroidDream is Back!

  • Post author:
  • Post last modified:May 31, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:May 31, 2011

There is a new nightmare on the Android Market, and again many Android devices are not going to have a…

Continue ReadingDroidDream is Back!

If Phishing Goes Mobile…

  • Post author:
  • Post last modified:May 30, 2011
  • Post category:Mobile/Security
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:May 30, 2011

One of the most surprising things I noticed concerning the Lockheed Martin Affair, was the affirmation contained in the Reuters…

Continue ReadingIf Phishing Goes Mobile…

Mobile Security: Vulnerabilities and Risks

  • Post author:
  • Post last modified:May 24, 2011
  • Post category:Mobile/Security
  • Post comments:5 Comments
  • Reading time:3 mins read
  • Post published:May 24, 2011

Today I took part as speaker to an event organized by my Company concerning Cloud and Mobile security. For this…

Continue ReadingMobile Security: Vulnerabilities and Risks

Tweets Of Democracy

  • Post author:
  • Post last modified:May 19, 2011
  • Post category:Mobile
  • Post comments:7 Comments
  • Reading time:5 mins read
  • Post published:May 19, 2011

Today President Obama held his speech on the Middle East announcing a new strategy (and new investments) for the Middle…

Continue ReadingTweets Of Democracy

Nine Months Of Living Dangerously

  • Post author:
  • Post last modified:May 18, 2011
  • Post category:Mobile/Security
  • Post comments:3 Comments
  • Reading time:4 mins read
  • Post published:May 18, 2011

The title of this post is not a subset of the famous Peter Weir’s Movie "The Year Of Living Dangerously",…

Continue ReadingNine Months Of Living Dangerously

If The Droid Gets The (China’s) Flu

  • Post author:
  • Post last modified:May 14, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:May 14, 2011

The thought of this night is dedicated to yet another couple of android malwares detected (as usual) in China. It…

Continue ReadingIf The Droid Gets The (China’s) Flu

Mobile Warfare In Libya Comes True

  • Post author:
  • Post last modified:April 14, 2011
  • Post category:Cyberwar/Mobile/Security
  • Post comments:8 Comments
  • Reading time:6 mins read
  • Post published:April 14, 2011

An interesting article from The Wall Street Journal confirmed what I have been writing in my posts since a couple…

Continue ReadingMobile Warfare In Libya Comes True

The Thin Red Line

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Mobile
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:April 8, 2011

There is a thin red line which links the alleged stability of the so called western world, with the instability…

Continue ReadingThe Thin Red Line
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 7
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM