Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

Mobile Security: Vulnerabilities and Risks

  • Post author:
  • Post last modified:May 24, 2011
  • Post category:Mobile/Security
  • Post comments:5 Comments
  • Reading time:3 mins read
  • Post published:May 24, 2011

Today I took part as speaker to an event organized by my Company concerning Cloud and Mobile security. For this…

Continue ReadingMobile Security: Vulnerabilities and Risks

Relazione Tavola Rotonda Mobile Security

  • Post author:
  • Post last modified:March 24, 2011
  • Post category:Mobile/Security
  • Post comments:0 Comments
  • Reading time:1 mins read
  • Post published:March 24, 2011

Ho pubblicato su Slideshare la relazione da me redatta della Tavola Rotonda "Mobile Security: Rischi, Tecnologie, Mercato" tenutasi il 14…

Continue ReadingRelazione Tavola Rotonda Mobile Security

Mobile Security: Impressioni a Caldo

  • Post author:
  • Post last modified:March 16, 2011
  • Post category:Mobile/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:March 16, 2011

Fortunatamente il virus che mi ha colpito sta mitigando i suoi effetti, la mente è un po' più lucida e…

Continue ReadingMobile Security: Impressioni a Caldo

L’Androide (Virtuale)? E’ Tutto Casa e Lavoro

  • Post author:
  • Post last modified:February 16, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:6 mins read
  • Post published:February 16, 2011

In questi i giorni i fari multimediali del mondo sono puntati verso Barcellona, dove si sta svolgendo il Mobile World…

Continue ReadingL’Androide (Virtuale)? E’ Tutto Casa e Lavoro
Copyright 2022 - HACKMAGEDDON.COM