Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Anonymous vs Syrian Electronic Soldiers

  • Post author:
  • Post last modified:September 28, 2011
  • Post category:Cyberwar/Security
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:September 28, 2011

Hactivism is making possible to bring wars and revolutions on the cyberspace, the fifth domain of war. In particular the…

Continue ReadingAnonymous vs Syrian Electronic Soldiers

Tweets Like Weapons

  • Post author:
  • Post last modified:July 27, 2011
  • Post category:Cyberwar/Social Networks
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:July 27, 2011

Thanks to Andrea Zapparoli Manzoni for suggesting the original concept of Consumerization of Warfare and this update. If the Cyberspace…

Continue ReadingTweets Like Weapons

Home Made Mobile Warfare

  • Post author:
  • Post last modified:June 26, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 26, 2011

David has shown me another example of the strict connection between real warfare and mobile warfare come from Afghanistan. Few…

Continue ReadingHome Made Mobile Warfare

Switch Off The Revolution (With An Infrared Sensor)

  • Post author:
  • Post last modified:June 23, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:6 mins read
  • Post published:June 23, 2011

Just a couple of months ago, in writing the first post about Mobile Warfare (which should have later become Consumerization…

Continue ReadingSwitch Off The Revolution (With An Infrared Sensor)

Tweets Of War Officially Confirmed

  • Post author:
  • Post last modified:June 11, 2011
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:3 mins read
  • Post published:June 11, 2011

Do you remember my Tweets of War? That is the post in which I hypothesized that the rebels in Libya…

Continue ReadingTweets Of War Officially Confirmed

Mobile Phones Vs Tanks

  • Post author:
  • Post last modified:April 26, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:April 26, 2011

Or rather "Tweets like Bullets"... I must confess I was uncertain about the title of this post. At the end…

Continue ReadingMobile Phones Vs Tanks

Tweets Of Freedom (Updated)

  • Post author:
  • Post last modified:April 25, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:April 25, 2011

It was exactly a month ago when commenting on the Mobile Warfare in Syria, I predicted a possible peak in…

Continue ReadingTweets Of Freedom (Updated)

Cyber Weapons and Real Wars

  • Post author:
  • Post last modified:April 18, 2011
  • Post category:Cyberwar/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:April 18, 2011

So far what is happening in Libya has offered to myself and to my dear colleague, friend and aviation guru…

Continue ReadingCyber Weapons and Real Wars

Mobile Warfare In Libya Comes True

  • Post author:
  • Post last modified:April 14, 2011
  • Post category:Cyberwar/Mobile/Security
  • Post comments:8 Comments
  • Reading time:6 mins read
  • Post published:April 14, 2011

An interesting article from The Wall Street Journal confirmed what I have been writing in my posts since a couple…

Continue ReadingMobile Warfare In Libya Comes True

The Thin Red Line

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Mobile
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:April 8, 2011

There is a thin red line which links the alleged stability of the so called western world, with the instability…

Continue ReadingThe Thin Red Line
  • 1
  • 2
  • Go to the next page
Copyright 2022 - HACKMAGEDDON.COM