Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

October 2011 Cyber Attacks Timeline (Part II)

  • Post author:
  • Post last modified:November 2, 2011
  • Post category:Cyber Attacks Timelines/Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:72 mins read
  • Post published:November 2, 2011

Halloween has just gone and here it is Part II of the October 2011 Cyber Attacks Timeline covering the second…

Continue ReadingOctober 2011 Cyber Attacks Timeline (Part II)

Stuxnet, Duqu, Stars And Galaxies…

  • Post author:
  • Post last modified:October 21, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:5 mins read
  • Post published:October 21, 2011

In few circumstances I happen to deal with my old (and short) career of Astrophysical. Except when I enjoy to…

Continue ReadingStuxnet, Duqu, Stars And Galaxies…

Back to The Future of Stuxnet

  • Post author:
  • Post last modified:October 19, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:3 mins read
  • Post published:October 19, 2011

While the U.S. and U.K. are debating whether to use Cyberwarfare, someone, somewhere, has decided not to waste further time…

Continue ReadingBack to The Future of Stuxnet

Cyberwar, Il Quinto Dominio Della Guerra

  • Post author:
  • Post last modified:September 24, 2011
  • Post category:Cyberwar/Posts In Italian/Security
  • Post comments:1 Comment
  • Reading time:2 mins read
  • Post published:September 24, 2011

Le Cyberwar sono state definite il quinto dominio della guerra. Ma se doveste spiegare in parole semplici a cosa corrisponde…

Continue ReadingCyberwar, Il Quinto Dominio Della Guerra

Hacking In The Time of Twitter

  • Post author:
  • Post last modified:August 5, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:August 5, 2011

So, after announcing an alleged hack to Italian Prison Guards, the threatening tweets anticipating the latest hack, have suddenly disappeared…

Continue ReadingHacking In The Time of Twitter

And The Winner Is…

  • Post author:
  • Post last modified:July 28, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:July 28, 2011

The Pwnie Awards is an annual awards ceremony celebrating the achievements and failures of security researchers and the security community.…

Continue ReadingAnd The Winner Is…

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:July 20, 2011

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue ReadingThe Two Faces of Hacking

Another Stuxnet from the “Stars”?

  • Post author:
  • Post last modified:April 25, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:2 mins read
  • Post published:April 25, 2011

According to Jerusalem Post, Iran has been targeted by a Second Cyber Attack after Stuxnet. The new malware has been…

Continue ReadingAnother Stuxnet from the “Stars”?

Cyber Weapons and Real Wars

  • Post author:
  • Post last modified:April 18, 2011
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:April 18, 2011

So far what is happening in Libya has offered to myself and to my dear colleague, friend and aviation guru…

Continue ReadingCyber Weapons and Real Wars

SCADA Security: Bridge the Gap

  • Post author:
  • Post last modified:April 15, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:April 15, 2011

Utilities and Security Vendors are taking very seriously the events of Stuxnet and they're consequently running for cover. Although due…

Continue ReadingSCADA Security: Bridge the Gap
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM