Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Autism and Hacking

  • Post author:
  • Post last modified:August 1, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:August 1, 2011

Today Jake Davis, allegedly known as Topiary, theĀ purported spokesman and frontman of the Infamous LulzSec hacker group, was heard by…

Continue ReadingAutism and Hacking

The Two Faces of Hacking

  • Post author:
  • Post last modified:July 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:July 20, 2011

My colleague Massimo Biagiotti suggested me this interesting matrix from IEEE which originally indicated some of the biggest and best…

Continue ReadingThe Two Faces of Hacking
Copyright 2022 - HACKMAGEDDON.COM