Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

What Security Vendors Said One Year Ago…

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:January 10, 2012

I did not resist, so after publishing the summary of Security Predictions for 2012, I checked out what security vendors…

Continue ReadingWhat Security Vendors Said One Year Ago…

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

The China Cyber Attacks Syndrome

  • Post author:
  • Post last modified:November 11, 2011
  • Post category:Cyberwar/Security
  • Post comments:5 Comments
  • Reading time:4 mins read
  • Post published:November 11, 2011

A week ago, the Office of the National Counterintelligence Executive published a report to Congress concerning the use of cyber…

Continue ReadingThe China Cyber Attacks Syndrome

Top Security Challenges for 2011: Check Point’s Perspective

  • Post author:
  • Post last modified:May 16, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 16, 2011

At the last Check Point Experience in Barcelona, the Israeli-based company unleashed its own Top Security Challenges for 2011. In…

Continue ReadingTop Security Challenges for 2011: Check Point’s Perspective

TCP Split Handshake: Why Cisco ASA is not susceptible

  • Post author:
  • Post last modified:May 12, 2011
  • Post category:Security
  • Post comments:6 Comments
  • Reading time:8 mins read
  • Post published:May 12, 2011

As I told yesterday, I was not very satisfied with the updated NSS remediation guide concerning the TCP Split Handshake…

Continue ReadingTCP Split Handshake: Why Cisco ASA is not susceptible

TCP Split Handshake: The (Never)ending Story…

  • Post author:
  • Post last modified:May 12, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:May 12, 2011

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible On May, the 9th 2011, nearly in contemporary, Cisco…

Continue ReadingTCP Split Handshake: The (Never)ending Story…

Some Random Thoughts On The Security Market

  • Post author:
  • Post last modified:May 10, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 10, 2011

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts…

Continue ReadingSome Random Thoughts On The Security Market
Copyright 2022 - HACKMAGEDDON.COM