Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

What Security Vendors Said One Year Ago…

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:January 10, 2012

I did not resist, so after publishing the summary of Security Predictions for 2012, I checked out what security vendors…

Continue ReadingWhat Security Vendors Said One Year Ago…

The China Cyber Attacks Syndrome

  • Post author:
  • Post last modified:November 11, 2011
  • Post category:Cyberwar/Security
  • Post comments:5 Comments
  • Reading time:4 mins read
  • Post published:November 11, 2011

A week ago, the Office of the National Counterintelligence Executive published a report to Congress concerning the use of cyber…

Continue ReadingThe China Cyber Attacks Syndrome

Top Security Challenges for 2011: Check Point’s Perspective

  • Post author:
  • Post last modified:May 16, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 16, 2011

At the last Check Point Experience in Barcelona, the Israeli-based company unleashed its own Top Security Challenges for 2011. In…

Continue ReadingTop Security Challenges for 2011: Check Point’s Perspective

TCP Split Handshake: Why Cisco ASA is not susceptible

  • Post author:
  • Post last modified:May 12, 2011
  • Post category:Security
  • Post comments:6 Comments
  • Reading time:8 mins read
  • Post published:May 12, 2011

As I told yesterday, I was not very satisfied with the updated NSS remediation guide concerning the TCP Split Handshake…

Continue ReadingTCP Split Handshake: Why Cisco ASA is not susceptible

TCP Split Handshake: The (Never)ending Story…

  • Post author:
  • Post last modified:May 12, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:May 12, 2011

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible On May, the 9th 2011, nearly in contemporary, Cisco…

Continue ReadingTCP Split Handshake: The (Never)ending Story…

Some Random Thoughts On The Security Market

  • Post author:
  • Post last modified:May 10, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 10, 2011

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts…

Continue ReadingSome Random Thoughts On The Security Market
Copyright 2022 - HACKMAGEDDON.COM