Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search

Finally I Saw One!

  • Post author:
  • Post last modified:August 26, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:August 26, 2011

Update: F-Secure posted in their blog the complete description on how the patient 0 was found: And here it is…

Continue ReadingFinally I Saw One!

Tweets Like Weapons

  • Post author:
  • Post last modified:July 27, 2011
  • Post category:Cyberwar/Social Networks
  • Post comments:2 Comments
  • Reading time:4 mins read
  • Post published:July 27, 2011

Thanks to Andrea Zapparoli Manzoni for suggesting the original concept of Consumerization of Warfare and this update. If the Cyberspace…

Continue ReadingTweets Like Weapons

Consumerization Of Warfare 2.0

  • Post author:
  • Post last modified:June 21, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:5 mins read
  • Post published:June 21, 2011

It looks like the consumerization of warfare is unstoppable and getting more and more mobile. After our first post of…

Continue ReadingConsumerization Of Warfare 2.0
Copyright 2022 - HACKMAGEDDON.COM