Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

First Security Breach In The App Store

  • Post author:
  • Post last modified:November 8, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:November 8, 2011

It looks like the Judgment Day for iOS has finally arrived. Until today the robustness of the AppStore has always…

Continue ReadingFirst Security Breach In The App Store

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:17 mins read
  • Post published:August 22, 2011

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue ReadingThe Dangerous Liaisons (Updated)

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:July 15, 2011

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue ReadingPhonarchy in the U.K.

Switch Off The Revolution (With An Infrared Sensor)

  • Post author:
  • Post last modified:June 23, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:June 23, 2011

Just a couple of months ago, in writing the first post about Mobile Warfare (which should have later become Consumerization…

Continue ReadingSwitch Off The Revolution (With An Infrared Sensor)

Consumerization Of Warfare 2.0

  • Post author:
  • Post last modified:June 21, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:5 mins read
  • Post published:June 21, 2011

It looks like the consumerization of warfare is unstoppable and getting more and more mobile. After our first post of…

Continue ReadingConsumerization Of Warfare 2.0

Some Random Thoughts On Location Tracking

  • Post author:
  • Post last modified:April 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:5 mins read
  • Post published:April 27, 2011

The Apple and the Android (almost) never agree in anything, but the issue of the Location Tracking has done the…

Continue ReadingSome Random Thoughts On Location Tracking

Grab Your Data? There’s An App For That!

  • Post author:
  • Post last modified:April 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:April 20, 2011

The news of the day is undoubtedly the discovery that Apple devices are a bit 'too nosy’ and regularly record…

Continue ReadingGrab Your Data? There’s An App For That!

Strong Authentication: Back To The Future

  • Post author:
  • Post last modified:April 12, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:April 12, 2011

The month of March will go into the annals of Information security. First the breach of RSA, then the issue…

Continue ReadingStrong Authentication: Back To The Future

The Thin Red Line

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Mobile
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:April 8, 2011

There is a thin red line which links the alleged stability of the so called western world, with the instability…

Continue ReadingThe Thin Red Line

Frutta Fuori Stagione

  • Post author:
  • Post last modified:March 19, 2011
  • Post category:Mobile/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:March 19, 2011

Si è da poco conclusa la Cansecwest, che ha ospitato al suo interno l'annuale contest Pwn2Own 2011, la sfida sponsorizzata…

Continue ReadingFrutta Fuori Stagione
  • 1
  • 2
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM