Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

A Flame on the Cyberwarfare Horizon

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:6 Comments
  • Reading time:5 mins read
  • Post published:May 28, 2012

Irony of fate: not even a day after the publication of a provocative article on the role of Cyber Warfare…

Continue ReadingA Flame on the Cyberwarfare Horizon

Israel Blamed for Fueling the Flame Cyber Weapon in Middle East

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:May 29, 2012

The day after its discovery, there are few doubts that the infamous malware dubbed Flame (or sKyWIper) has been developed…

Continue ReadingIsrael Blamed for Fueling the Flame Cyber Weapon in Middle East

The 2010 Olympic Games

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:June 4, 2012

Two months again and the World will assist to the 2012 London Olympic Games. Unfortunately the same is not true…

Continue ReadingThe 2010 Olympic Games
Copyright 2022 - HACKMAGEDDON.COM