Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Social Notice

  • Post author:
  • Post last modified:June 9, 2011
  • Post category:Social Networks
  • Post comments:0 Comments
  • Reading time:7 mins read
  • Post published:June 9, 2011

The relationship between social networks and law is very controversial. If, on one hand, we are now accustomed to consider…

Continue ReadingSocial Notice

Grab Your Data? There’s An App For That!

  • Post author:
  • Post last modified:April 20, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:April 20, 2011

The news of the day is undoubtedly the discovery that Apple devices are a bit 'too nosy’ and regularly record…

Continue ReadingGrab Your Data? There’s An App For That!

Privacy e Cinguettii…

  • Post author:
  • Post last modified:January 8, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:January 8, 2011

Una volta i piccioni viaggiatori trasportavano i messaggi, oggi i canarini azzurri trasportano gli ordini della Corte Federale USA. Parlando…

Continue ReadingPrivacy e Cinguettii…

Quando i dati si perdono tra le nubi

  • Post author:
  • Post last modified:December 17, 2010
  • Post category:Security
  • Post comments:2 Comments
  • Reading time:3 mins read
  • Post published:December 17, 2010

Il cloud è considerato una delle Tecnologie Emergenti del 2011, anche per quanto riguarda le implicazioni di sicurezza. I benefici…

Continue ReadingQuando i dati si perdono tra le nubi
Copyright 2022 - HACKMAGEDDON.COM