Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search

Lo Smartphone? Ha fatto il BOT!

  • Post author:
  • Post last modified:February 23, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:7 mins read
  • Post published:February 23, 2011

E' stato appena pubblicato un interessante articolo di Georgia Weidman relativo al concept di una botnet di smartphone controllati tramite…

Continue ReadingLo Smartphone? Ha fatto il BOT!

Sbucciare Una Mela In 6 Minuti

  • Post author:
  • Post last modified:February 13, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:February 13, 2011

Poteva, questo scorcio di 2011 regalarci (in)soddisfazioni di sicurezza informatica solo per il povero Androide? Niente affatto! Ed ecco che…

Continue ReadingSbucciare Una Mela In 6 Minuti
Copyright 2022 - HACKMAGEDDON.COM