Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Web Based Threats and False Positives

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:September 29, 2012

In the last few days I have received a couple of advises regarding the fact that some URL filter engines…

Continue ReadingWeb Based Threats and False Positives

First Adobe Reader 0-Day Bypassing Sandbox Protection In The Wild

  • Post author:Paolo Passeri
  • Post last modified:May 24, 2015
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:November 8, 2012

Few Days ago, a Trend Micro Research Paper on the Russian Underground gave a scary landscape of the Underground Black…

Continue ReadingFirst Adobe Reader 0-Day Bypassing Sandbox Protection In The Wild

Un Androide Da Sogno… Anzi Da Incubo… Magari Alieno…

  • Post author:
  • Post last modified:March 2, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:6 mins read
  • Post published:March 2, 2011

Il sogno è quello del nuovo (ennesimo) malware che ha preso di mira il povero Androide (chiamato romanticamente DroidDream). L'incubo…

Continue ReadingUn Androide Da Sogno… Anzi Da Incubo… Magari Alieno…

Non C’è Pace Per l’Androide

  • Post author:
  • Post last modified:January 30, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:3 mins read
  • Post published:January 30, 2011

Non c'e' dubbio, le facili previsioni che davano l'Androide al centro dei problemi di sicurezza per il 2011 hanno centrato…

Continue ReadingNon C’è Pace Per l’Androide
Copyright 2022 - HACKMAGEDDON.COM