Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Mobile Phones Vs Tanks

  • Post author:
  • Post last modified:April 26, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:April 26, 2011

Or rather "Tweets like Bullets"... I must confess I was uncertain about the title of this post. At the end…

Continue ReadingMobile Phones Vs Tanks

(Dis)informazione via SMS

  • Post author:
  • Post last modified:February 5, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:3 mins read
  • Post published:February 5, 2011

  I social media e gli smartphone sono stati senza dubbio protagonisti degli eventi in Egitto. Dapprima i cinguetti su…

Continue Reading(Dis)informazione via SMS
Copyright 2022 - HACKMAGEDDON.COM