Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
  • Toggle website search

Looking Inside a Year of Android Malware

  • Post author:
  • Post last modified:August 14, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:8 mins read
  • Post published:August 14, 2011

As you will probably know my Birthday post for Android Malware has deserved a mention from Engadget and Wired. Easily…

Continue ReadingLooking Inside a Year of Android Malware

One Year Of Android Malware (Full List)

  • Post author:
  • Post last modified:August 11, 2011
  • Post category:Mobile/Security
  • Post comments:30 Comments
  • Reading time:57 mins read
  • Post published:August 11, 2011

Update August 14: After the list (and the subsequent turmoil) here is the Look Inside a Year Of Android Malware.…

Continue ReadingOne Year Of Android Malware (Full List)

Happy Birthday! One Year of Android Malware

  • Post author:
  • Post last modified:August 9, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:27 mins read
  • Post published:August 9, 2011

Exactly One year ago (9 August 2010) Kaspersky discovered the first SMS Trojan for Android in the Wild dubbed SMS.AndroidOS.FakePlayer.a.…

Continue ReadingHappy Birthday! One Year of Android Malware

DroidDream is Back!

  • Post author:
  • Post last modified:May 31, 2011
  • Post category:Mobile/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:May 31, 2011

There is a new nightmare on the Android Market, and again many Android devices are not going to have a…

Continue ReadingDroidDream is Back!

The Antivirus is Dead, Long Live the Antivirus!

  • Post author:
  • Post last modified:May 18, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:7 mins read
  • Post published:May 18, 2011

The Google Chromebook (that is the first Chromium OS powered devices) was presented few days ago (and is ready to…

Continue ReadingThe Antivirus is Dead, Long Live the Antivirus!

Top Security Challenges for 2011: Check Point’s Perspective

  • Post author:
  • Post last modified:May 16, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 16, 2011

At the last Check Point Experience in Barcelona, the Israeli-based company unleashed its own Top Security Challenges for 2011. In…

Continue ReadingTop Security Challenges for 2011: Check Point’s Perspective

Some Random Thoughts On The Security Market

  • Post author:
  • Post last modified:May 10, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:8 mins read
  • Post published:May 10, 2011

The intention by UK-headquartered company Sophos to acquire Astaro, the privately-held security company co-headquartered in Karlsruhe, Germany and Wilmington, Massachusetts…

Continue ReadingSome Random Thoughts On The Security Market

Some Random Thoughts On RSA Breach

  • Post author:
  • Post last modified:April 10, 2011
  • Post category:Security
  • Post comments:15 Comments
  • Reading time:12 mins read
  • Post published:April 10, 2011

June 7 Update: RSA admits some stolen seeds were used to attack Lockeed Martin and will replace SecurID tokens for…

Continue ReadingSome Random Thoughts On RSA Breach

Chronicles Of The Android

  • Post author:
  • Post last modified:April 1, 2011
  • Post category:Mobile/Security
  • Post comments:2 Comments
  • Reading time:8 mins read
  • Post published:April 1, 2011

The title of this post recalls a science fiction novel, but actually summarizes well a couple of news concerning the…

Continue ReadingChronicles Of The Android

Tragedie Reali e Sciacalli Virtuali (Aggiornamento)

  • Post author:
  • Post last modified:March 12, 2011
  • Post category:Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:March 12, 2011

Gli sconvolgimenti naturali a cui รจ ciclicamente sottoposto il genere umano generano tra gli uomini reazioni contrastanti: da un lato…

Continue ReadingTragedie Reali e Sciacalli Virtuali (Aggiornamento)
  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Go to the next page

Subscribe

Enter your email address to subscribe and receive notifications of new posts by email.

Join 1,190 other subscribers
Copyright 2022 - HACKMAGEDDON.COM