Skip to content
HACKMAGEDDON

Information Security Timelines and Statistics

  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics
Menu Close
  • About
  • Submit An Attack
  • Cyber Attacks Timeline
    • 2011 Cyber Attacks Timeline Master Index
    • 2012 Cyber Attacks Timeline Master Index
    • 2013 Cyber Attacks Timeline Master Index
    • 2014 Cyber Attacks Timeline Master Index
    • 2015 Cyber Attacks Timelines Master Index
    • 2017 Master Table
    • 2018 Master Table
  • Cyber Attacks Statistics

Consumer AVs And Exploit Prevention

  • Post author:Paolo Passeri
  • Post published:August 23, 2012
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read

Targeted attacks exploiting endpoint vulnerabilities are becoming more and more common and increasingly aggressive. For this reason I could not…

Continue Reading Consumer AVs And Exploit Prevention

If Phishing Goes Mobile…

  • Post author:
  • Post published:May 30, 2011
  • Post category:Mobile/Security
  • Post comments:5 Comments
  • Reading time:4 mins read

One of the most surprising things I noticed concerning the Lockheed Martin Affair, was the affirmation contained in the Reuters…

Continue Reading If Phishing Goes Mobile…

More Random Thoughts on the RSA Breach

  • Post author:
  • Post published:May 28, 2011
  • Post category:Security
  • Post comments:6 Comments
  • Reading time:4 mins read

Probably it was a quite easy prediction, however it looks like what I suggested on my random thoughts on the…

Continue Reading More Random Thoughts on the RSA Breach

TCP Split Handshake: Why Cisco ASA is not susceptible

  • Post author:
  • Post published:May 12, 2011
  • Post category:Security
  • Post comments:6 Comments
  • Reading time:7 mins read

As I told yesterday, I was not very satisfied with the updated NSS remediation guide concerning the TCP Split Handshake…

Continue Reading TCP Split Handshake: Why Cisco ASA is not susceptible

TCP Split Handshake: The (Never)ending Story…

  • Post author:
  • Post published:May 12, 2011
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:5 mins read

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible On May, the 9th 2011, nearly in contemporary, Cisco…

Continue Reading TCP Split Handshake: The (Never)ending Story…

Other Considerations On TCP Split Handshake

  • Post author:
  • Post published:April 21, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:4 mins read

The storm unleashed by NSS Labs test for the TCP split handshake attack which affected 5 firewall vendors  is far…

Continue Reading Other Considerations On TCP Split Handshake

TCP Split Handshake Attack Explained

  • Post author:Dot Nerk
  • Post published:April 17, 2011
  • Post category:Security
  • Post comments:9 Comments
  • Reading time:6 mins read

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible Update May 11: The Never Ending Story Update April…

Continue Reading TCP Split Handshake Attack Explained
Copyright 2021 - HACKMAGEDDON.COM
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok