Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Browsing Security Predictions for 2012

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:5 mins read
  • Post published:January 8, 2012

Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…

Continue ReadingBrowsing Security Predictions for 2012

Relazione Tavola Rotonda Mobile Security

  • Post author:
  • Post last modified:March 24, 2011
  • Post category:Mobile/Security
  • Post comments:0 Comments
  • Reading time:1 mins read
  • Post published:March 24, 2011

Ho pubblicato su Slideshare la relazione da me redatta della Tavola Rotonda "Mobile Security: Rischi, Tecnologie, Mercato" tenutasi il 14…

Continue ReadingRelazione Tavola Rotonda Mobile Security

Paga in contanti? No grazie ho il telefono…

  • Post author:
  • Post last modified:December 12, 2010
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:2 mins read
  • Post published:December 12, 2010

Google ha appena rilasciato il Nexus S, nuovo terminale Androide costruito da Samsung. In attesa dell'arrivo nel Belpaese, il terminale,…

Continue ReadingPaga in contanti? No grazie ho il telefono…
Copyright 2022 - HACKMAGEDDON.COM