Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

And The Winner Is…

  • Post author:
  • Post last modified:July 28, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:July 28, 2011

The Pwnie Awards is an annual awards ceremony celebrating the achievements and failures of security researchers and the security community.…

Continue ReadingAnd The Winner Is…

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:July 20, 2011

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue ReadingThe Two Faces of Hacking
Copyright 2022 - HACKMAGEDDON.COM