Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:17 mins read
  • Post published:August 22, 2011

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue ReadingThe Dangerous Liaisons (Updated)

Looking Inside a Year of Android Malware

  • Post author:
  • Post last modified:August 14, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:8 mins read
  • Post published:August 14, 2011

As you will probably know my Birthday post for Android Malware has deserved a mention from Engadget and Wired. Easily…

Continue ReadingLooking Inside a Year of Android Malware

One Year Of Android Malware (Full List)

  • Post author:
  • Post last modified:August 11, 2011
  • Post category:Mobile/Security
  • Post comments:30 Comments
  • Reading time:57 mins read
  • Post published:August 11, 2011

Update August 14: After the list (and the subsequent turmoil) here is the Look Inside a Year Of Android Malware.…

Continue ReadingOne Year Of Android Malware (Full List)

Happy Birthday! One Year of Android Malware

  • Post author:
  • Post last modified:August 9, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:27 mins read
  • Post published:August 9, 2011

Exactly One year ago (9 August 2010) Kaspersky discovered the first SMS Trojan for Android in the Wild dubbed SMS.AndroidOS.FakePlayer.a.…

Continue ReadingHappy Birthday! One Year of Android Malware

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:July 15, 2011

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue ReadingPhonarchy in the U.K.

Consumerization Of Warfare 2.0

  • Post author:
  • Post last modified:June 21, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:5 mins read
  • Post published:June 21, 2011

It looks like the consumerization of warfare is unstoppable and getting more and more mobile. After our first post of…

Continue ReadingConsumerization Of Warfare 2.0

When Angry Birds eat Plankton

  • Post author:
  • Post last modified:June 14, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:3 mins read
  • Post published:June 14, 2011

What happens when Angry Birds eat Plankton? Simple: they get Sick Birds, go to the Android Market and infect more…

Continue ReadingWhen Angry Birds eat Plankton

Sometimes They Come Back

  • Post author:
  • Post last modified:June 6, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:June 6, 2011

Not even a week after the light version of DroidDream, a new nightmare rises from the Android Market to menace…

Continue ReadingSometimes They Come Back

DroidDream is Back!

  • Post author:
  • Post last modified:May 31, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:May 31, 2011

There is a new nightmare on the Android Market, and again many Android devices are not going to have a…

Continue ReadingDroidDream is Back!

Nine Months Of Living Dangerously

  • Post author:
  • Post last modified:May 18, 2011
  • Post category:Mobile/Security
  • Post comments:3 Comments
  • Reading time:4 mins read
  • Post published:May 18, 2011

The title of this post is not a subset of the famous Peter Weir’s Movie "The Year Of Living Dangerously",…

Continue ReadingNine Months Of Living Dangerously
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 7
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM