Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Tweets Like Weapons

  • Post author:
  • Post last modified:July 27, 2011
  • Post category:Cyberwar/Social Networks
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:July 27, 2011

Thanks to Andrea Zapparoli Manzoni for suggesting the original concept of Consumerization of Warfare and this update. If the Cyberspace…

Continue ReadingTweets Like Weapons

Mobile Phones Vs Tanks

  • Post author:
  • Post last modified:April 26, 2011
  • Post category:Cyberwar/Security
  • Post comments:4 Comments
  • Reading time:6 mins read
  • Post published:April 26, 2011

Or rather "Tweets like Bullets"... I must confess I was uncertain about the title of this post. At the end…

Continue ReadingMobile Phones Vs Tanks

The Thin Red Line

  • Post author:
  • Post last modified:April 8, 2011
  • Post category:Mobile
  • Post comments:5 Comments
  • Reading time:5 mins read
  • Post published:April 8, 2011

There is a thin red line which links the alleged stability of the so called western world, with the instability…

Continue ReadingThe Thin Red Line

Corps of (Network and Security) Engineers

  • Post author:
  • Post last modified:March 29, 2011
  • Post category:Security
  • Post comments:7 Comments
  • Reading time:7 mins read
  • Post published:March 29, 2011

A couple of posts ago, in the article “Tweets Of War”, I discussed about the possibility to use consumer mobile…

Continue ReadingCorps of (Network and Security) Engineers
Copyright 2022 - HACKMAGEDDON.COM