Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude

Tuesday, May 22, 2007

A Client Application for "Secure" E-banking?

This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. Remember a previous post heading in the opposite direction, where a bank was trying to rebuild confidence in the most abused phishing medium - the email - to keep in touch with its customers? Here's another company that's betting on a third-party client application to solve the problem of secure E-banking totally falling victim in the secure channel communication myopia one that I think has nothing to do with reality when it comes to the success of phishing :

"Here’s how Armored Online works: A company, such as a financial institution or online retailer, offers a downloadable client to customers through its website. That client then gives the customer’s computer a secure channel with which to communicate and transact with the company. Its Java-based browser is locked down, meaning it won’t accept any plug-ins, like cookies used by criminals. What’s more, the client can only “talk” to the server at the bank or online store. “It’s like iTunes for banks,” Mr. Sowerby said."

The attack of the disabled cookies? Not really, so be realistic. Coming up with a third-party application as the cornerstone of E-banking security directly conflicts with E-banking's biggest benefit - flexibility due to the compatibility with the most popular browsers. So you'd rather focus on the current situation - Brandjacking instead of re-inventing the SSL wheel -- as a matter of fact the Gozi trojan and the Nuclear Grabber are quite comfortable with SSL as they bypass it entirely. Even worse, a trojanized copy of the program will emerge given it receives any acceptance at all. And if banks start embracing it -- don't -- we can easily start talking about DRM enabled E-banking where, both, banks and customers will turn into virtual hostages to a third-party application trying to reboot the market for anti-phishing services, totally forgetting the problem is not in the lack of unencrypted transactions as no one is sniffing the credentials, but pushing fake sites instead of letting customers pull the sites for themselves.

Don't disrupt in irrelevance.
- May 22, 2007
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile

Enter your e-mail address:

Powered by FeedPress

Search This Blog

Subscribe to Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Total Pageviews

Followers

Blog Archive

  • ►  2026 (9)
    • ►  March (1)
    • ►  February (2)
    • ►  January (6)
  • ►  2025 (34)
    • ►  December (1)
    • ►  November (1)
    • ►  September (6)
    • ►  July (3)
    • ►  June (1)
    • ►  May (7)
    • ►  February (5)
    • ►  January (10)
  • ►  2024 (100)
    • ►  December (5)
    • ►  November (5)
    • ►  October (7)
    • ►  September (16)
    • ►  August (6)
    • ►  July (11)
    • ►  June (11)
    • ►  May (1)
    • ►  April (8)
    • ►  March (3)
    • ►  February (15)
    • ►  January (12)
  • ►  2023 (160)
    • ►  December (15)
    • ►  November (24)
    • ►  October (9)
    • ►  September (25)
    • ►  August (16)
    • ►  July (5)
    • ►  June (8)
    • ►  May (7)
    • ►  April (16)
    • ►  March (14)
    • ►  February (17)
    • ►  January (4)
  • ►  2022 (252)
    • ►  December (14)
    • ►  November (54)
    • ►  October (45)
    • ►  September (3)
    • ►  August (24)
    • ►  July (17)
    • ►  June (28)
    • ►  May (1)
    • ►  April (3)
    • ►  March (11)
    • ►  February (15)
    • ►  January (37)
  • ►  2021 (196)
    • ►  December (17)
    • ►  November (9)
    • ►  October (28)
    • ►  September (27)
    • ►  August (2)
    • ►  July (19)
    • ►  June (12)
    • ►  May (11)
    • ►  April (23)
    • ►  March (24)
    • ►  February (15)
    • ►  January (9)
  • ►  2020 (56)
    • ►  December (35)
    • ►  November (1)
    • ►  October (1)
    • ►  September (4)
    • ►  August (3)
    • ►  July (5)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (2)
  • ►  2019 (68)
    • ►  December (9)
    • ►  November (3)
    • ►  October (1)
    • ►  September (11)
    • ►  August (2)
    • ►  July (6)
    • ►  May (16)
    • ►  April (3)
    • ►  March (1)
    • ►  February (11)
    • ►  January (5)
  • ►  2018 (41)
    • ►  December (3)
    • ►  November (2)
    • ►  October (25)
    • ►  September (1)
    • ►  August (2)
    • ►  July (3)
    • ►  May (3)
    • ►  January (2)
  • ►  2017 (16)
    • ►  November (3)
    • ►  July (1)
    • ►  May (10)
    • ►  January (2)
  • ►  2016 (46)
    • ►  December (12)
    • ►  September (4)
    • ►  August (9)
    • ►  June (3)
    • ►  May (13)
    • ►  April (5)
  • ►  2015 (3)
    • ►  August (2)
    • ►  July (1)
  • ►  2014 (11)
    • ►  October (1)
    • ►  March (3)
    • ►  January (7)
  • ►  2013 (77)
    • ►  December (5)
    • ►  November (12)
    • ►  October (3)
    • ►  September (5)
    • ►  August (13)
    • ►  July (7)
    • ►  June (7)
    • ►  May (5)
    • ►  April (5)
    • ►  March (3)
    • ►  February (6)
    • ►  January (6)
  • ►  2012 (38)
    • ►  December (2)
    • ►  November (7)
    • ►  October (3)
    • ►  September (4)
    • ►  August (2)
    • ►  July (2)
    • ►  June (2)
    • ►  May (4)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (6)
  • ►  2011 (59)
    • ►  December (1)
    • ►  October (8)
    • ►  September (4)
    • ►  August (4)
    • ►  July (3)
    • ►  June (1)
    • ►  May (10)
    • ►  April (5)
    • ►  March (12)
    • ►  February (6)
    • ►  January (5)
  • ►  2010 (90)
    • ►  September (2)
    • ►  August (3)
    • ►  July (7)
    • ►  June (7)
    • ►  May (16)
    • ►  April (15)
    • ►  March (13)
    • ►  February (17)
    • ►  January (10)
  • ►  2009 (134)
    • ►  December (9)
    • ►  November (13)
    • ►  October (9)
    • ►  September (10)
    • ►  August (12)
    • ►  July (14)
    • ►  June (11)
    • ►  May (11)
    • ►  April (11)
    • ►  March (11)
    • ►  February (12)
    • ►  January (11)
  • ►  2008 (267)
    • ►  December (10)
    • ►  November (15)
    • ►  October (25)
    • ►  September (17)
    • ►  August (26)
    • ►  July (38)
    • ►  June (19)
    • ►  May (33)
    • ►  April (30)
    • ►  March (19)
    • ►  February (21)
    • ►  January (14)
  • ▼  2007 (331)
    • ►  December (19)
    • ►  November (33)
    • ►  October (32)
    • ►  September (28)
    • ►  August (25)
    • ►  July (22)
    • ►  June (20)
    • ▼  May (30)
      • MSN Spamming Bot
      • The WebAttacker in Action
      • The Revenge of the Waitress
      • Reverse Engineering the ANI Vulnerability
      • Phrack Magazine's Latest Issue
      • Google Hacking for Vulnerabilities
      • Microsoft's Forefront Ad Campaign
      • Jihadists' Anonymous Internet Surfing Preferences
      • Counter Espionage Tips from the Cold War
      • A Client Application for "Secure" E-banking?
      • A Malware Loader For Sale
      • MySpace's Sex Offenders Problem
      • Tricking a Laptop's Fingerprint Authentication
      • Commercializing Mobile Malware
      • Yet Another Malware Cryptor In the Wild
      • Corporate Espionage Through Botnets
      • Visual Script Obfuscation
      • The Jihadist Security Encyclopedia
      • Sampling Jihadists' IPs
      • Mind Mapping Web 2.0 Threats
      • XSS The Planet
      • Big Brother Awards 2007
      • Defeating Virtual Keyboards
      • International Cryptography Regulations Map
      • Disintermediating the Major Defense Contractors
      • DDoS on Demand VS DDoS Extortion
      • A Chronology of a Bomb Plot
      • Winamp PoC Backdoor and a Zero Day
      • Anti-Censorship Lifestyle
      • The Brandjacking Index
    • ►  April (20)
    • ►  March (41)
    • ►  February (32)
    • ►  January (29)
  • ►  2006 (325)
    • ►  December (20)
    • ►  November (20)
    • ►  October (28)
    • ►  September (40)
    • ►  August (27)
    • ►  July (28)
    • ►  June (28)
    • ►  May (33)
    • ►  April (20)
    • ►  March (19)
    • ►  February (23)
    • ►  January (39)
  • ►  2005 (6)
    • ►  December (6)

Popular Posts

  • Exposing Bulgaria's Largest Data Leak - An OSINT Analysis
    I've recently came across to a news article detailing the recently leaked Bulgaria NAP records database and I decided to take a closer...
  • DDanchev is for Hire!
    Looking for a full time threat intelligence analyst, cybercrime researcher, or a security blogger? Approach me at dancho.danchev@hush...
  • Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts
    In a world dominated by fraudulent propositions it should be noted that Jabber and XMPP remain the primary secure communication channel f...
  • Historical OSINT - Google Docs Hosted Rogue Chrome Extension Serving Campaign Spotted in the Wild
    In, a, cybercrime, ecosystem, dominated, by, malicious, software, releases, cybercriminals, continue, actively, populating, their, botnet...
  • Exposing the Conti Ransomware Gang - An OSINT Analysis
    UPDATE: The following set of graphics aims to visualize the recently leaked Conti ransomware gang members conversations. UPDATE: The followi...
  • Historical OSINT - Massive Black Hat SEO Campaign, Spotted in the Wild, Serves Scareware
    In, a, cybercrime, ecosystem, dominated, by, hundreds, of, malicious, software, releases, cybercriminals, continue, actively, populating, th...
  • Historical OSINT - Hundreds of Malicious Web Sites Serve Client-Side Exploits, Lead to Rogue YouTube Video Players
    In, a, cybercrime, ecosystem, dominated, by, hundreds, of, malicious, software, releases, cybercriminals, continue, actively, populating, a,...
  • Historical OSINT - Malicious Malvertising Campaign, Spotted at FoxNews, Serves Scareware
    In, a, cybercrime, ecosystem, dominated, by, fraudulent, propositions, cybercriminals, continue, actively, populating, their, botnet's, ...
  • Historical OSINT - Rogue MyWebFace Application Serving Adware Spotted in the Wild
    In, a, cybercrime, ecosystem, dominated, by, malicious, software, releases, cybercriminals, continue, actively, populating, their, botnet...
  • Exposing a "Fast-Flux" Name Server Based Rogue Fraudulent and Malicious Online Infrastructure - An Analysis
    Dear blog readers, I've decided a diverse portfolio of fast flux name servers which basically act as a bulletproof botnet C&C commun...

Labels

  • 29A
  • 29A Virus Coding Group
  • 419 Scam
  • AbdAllah
  • Abdallah Internet Hizmetleri
  • Able Danger
  • Abuse Department
  • Active Security Monitor
  • Advance Fee Scam
  • Advanced Persistent Threat
  • Advertising
  • Adware
  • Affiliate Network
  • Ahmad Al Agha
  • Al Qaeda
  • Aleksandr Zhukov
  • Allied Group Inc
  • Amazon AWS
  • ANA Spoofer Project
  • Android
  • Anonymity
  • Anonymizer
  • Anonymous
  • Anonymous Hacking Collective
  • Anti-Phishing Group
  • Antivirus
  • Antivirus Signatures
  • Anton Nikolaevich Korotchenko
  • AOL
  • API
  • Apple
  • APT
  • Aqua ZeuS Gang
  • Armadillo Phone
  • Ashiyane Digital Security Team
  • ASProx
  • Astalavista
  • Astalavista Security Group
  • Astalavista.box.sk
  • ATM Skimmer
  • ATS
  • Australia
  • Authentication
  • Avalance Botnet
  • Avast
  • Background Check
  • BadB
  • Bahama Botnet
  • BakaSoftware
  • Bantu
  • BBC
  • Bebo
  • Bed Time Reading
  • Behrooz Kamalian
  • Best Practices
  • BGP
  • Big Brother
  • Bill Gates Botnet
  • Biography
  • Biometrics
  • Bitcoin
  • Bjorn Andreasson
  • Black Energy
  • Blackhat SEO
  • Blood and Honor
  • Blood and Honor Bulgaria
  • Boeing
  • Bogus Account
  • bother
  • Botners
  • Botnet
  • Botnets
  • Box.sk
  • Brian Krebs
  • Brute-Forcing
  • Bulgaria
  • Bulgaria Law Enforcement
  • Bulgarian Cyber Army
  • Bulgarian Cyber Army Hacking Group
  • Bullet Proof Hosting
  • Bust
  • C4I
  • CALEA
  • Caller ID
  • Caller ID Spoofer
  • Candid Wuest
  • CAPTCHA
  • Career Enrichment
  • Cash Transfers
  • CCTV
  • CDT
  • Cell Phone Monitoring
  • Cell Phone Surveillance
  • CellDEK
  • Censorship
  • Center for Democracy and Technology
  • CERT
  • Cheyenne Mountain Operations Center
  • China
  • China Eagle Union
  • CIA
  • CipherTrust
  • Classified Information
  • Client-Side Exploits
  • Client-Side Vulnerabilities
  • CNO
  • COCOM
  • Cold War
  • COMINT
  • Competitive Intelligence
  • Compliance
  • Computer Crime Survey
  • Computer Network Operation
  • Conficker
  • Confidential Connections
  • Conspiracy
  • Conspiracy Theory
  • Conti
  • Conti Ransomware
  • Conti Gang
  • Conti Ransomware
  • Conti Ransomware Gang
  • Cookies
  • CoolWebSearch
  • Corporate Risk Management
  • Counter Espionage
  • Counter Intelligence
  • Credit Cards
  • Crimeware
  • Critical Infrastructure
  • Crusade Affiliates
  • Crypters
  • Cryptography
  • Cryptome
  • Cryptoviral Extortion
  • CSIA
  • CVE
  • Cyber Attack
  • Cyber Espionage
  • Cyber Insurance
  • Cyber Jihad
  • Cyber Militia
  • Cyber Security Industry Alliance
  • Cyber Security Investment
  • Cyber Terrorism
  • Cyber Threat Actor Attribution Maltego Graphs
  • Cyber Warfare
  • Cyber Weapon
  • Cyber Weapons
  • CyberCamp 2016
  • Cybercrime
  • Cybercrime Ecosystem
  • Cybercrime Forum
  • Cybercrime Forum Data Set
  • Cybercrime Incident Response
  • Cybercrime Incident Response Maltego Graphs
  • Cybercrime Search Engine
  • Cybercriminal
  • Cyberpunk
  • Cyberspace
  • Cybertronics
  • Daniel Brandt
  • Dark Vader
  • Dark Forum
  • Dark Web
  • Dark Web Onion
  • Dark Web Search Engine
  • DarkComet RAT
  • Darkode
  • Darkode Forum Community
  • Data Acquisition
  • Data Breach
  • Data Center
  • Data Leak
  • Data Mining
  • David Endler
  • DCLeaks
  • DDoS
  • DDoS For Hire
  • Defense Complex
  • Delicious Information Warfare
  • Denmark
  • Department of Defense
  • DHS
  • DIA
  • Digital Armaments
  • Digital Forensics
  • Digital Rights
  • Dilbert
  • Distributed Computing
  • Distributed Computing Project
  • Distributed Project
  • DNS
  • DNS Changer
  • DoD
  • DoJ
  • DotCom
  • DreamHost
  • Dropbox
  • Durzhavna Sigurnost
  • DVD of the Weekend
  • E-Banking
  • E-Business
  • E-Commerce
  • E-Shop
  • Eavesdropping
  • Ebay
  • ECHELON
  • ECOFIN Projects
  • Economics
  • eID
  • Electric Universe
  • Electromagnetic Pulse Weapons
  • Electronic Banking
  • ELINT
  • Emotet
  • Emotet Botnet
  • EMP
  • Encrochat
  • Encrochat Database Leak
  • Encrypted Communication
  • Encrypted Phone
  • Encryption
  • Enigma
  • ENISA
  • Enki Bilal
  • Enron
  • Erasmus Bridge
  • Eric Goldman
  • Espionage
  • Espionage Movie
  • Evgeniy Mikhaylovich Bogachev
  • Exmanoize
  • Exploit Broker
  • Exploit Kit
  • Exploits
  • Eyeball Series
  • F-Secure
  • Facebook
  • Fake Account
  • Fake Adobe Flash Player
  • Fake Certificate
  • Fake Chrome Extension
  • Fake Chrome Update
  • Fake Code Signing Certificate
  • Fake Confirmed Facebook Friend Request Email
  • Fake Documents
  • Fake Facebook Appeal
  • Fake Facebook Notification
  • Fake Facebook Profile Spy Application
  • Fake Firefox Update
  • Fake Hosting Provider
  • Fake ID
  • Fake Internet Explorer Update
  • Fake Passport
  • Fake Personal ID
  • Fake Safari Update
  • Fake Security Software
  • Fake Tech Support Scam
  • Fake Utility Bill
  • Fake Video Codec
  • Fake Visa
  • Fake Visa Application
  • Fake Web Site
  • Fake Who's Viewed Your Facebook Profile Extension
  • Fake YouTube Player
  • Fast-Flux
  • FBI
  • FBI Most Wanted
  • FCC
  • FDIC
  • Financial Management
  • Firas Nur Al Din Dardar
  • FireEye
  • Flashpoint Intel
  • Foreign Influence Operations
  • Forensics
  • Forwarderz
  • FoxNews
  • Fraud
  • Free Speech
  • FSB
  • FTLog
  • FTLog Worm
  • Gartner
  • Gavril Danilkin
  • GazTranzitStroyInfo
  • GCHQ
  • GDBOP
  • Generation I
  • George Bush
  • Georgi Markov
  • Georgia
  • Germany
  • Gift Cards
  • GiveMeDB
  • Global Security Challenge
  • Goa Trance
  • GoDaddy
  • Google
  • Google Firebase
  • Google Ads
  • Google Docs
  • Google Earth
  • Google Groups
  • Google Hacking
  • Google Maps
  • Google Play
  • Google Store
  • Greece
  • Growth Hacker
  • GRU
  • Guccifer 2.0
  • GUI
  • Gumblar
  • Hacked Database
  • Hacked Web Site
  • Hacker
  • Hackers
  • Hacking
  • Hacking Book
  • Hacking Forum
  • Hacking Group
  • Hacking Groups
  • Hacking Tools
  • HackPhreak
  • HackPhreak Hacking Group
  • Hacktivism
  • Haiti
  • Hamas
  • Hezbollah
  • High Tech Brazil Hack Team
  • Hilary Kneber
  • HKLeaks
  • Home Molestation
  • Homebrew
  • Honeynet Project
  • Honker Union of China
  • HUMINT
  • ICBM
  • ID Theft
  • iDefense
  • Identity Theft
  • Illegal Arrest
  • Illegal Hosting
  • Illegal Restraint
  • IMINT
  • IMLogic
  • India
  • India Company
  • Indicator of Compromise
  • Information Operations
  • Information Security
  • Information Security Forum
  • Information Security Market
  • Information Warfare
  • Infrastructure Security
  • InFraud
  • InFraud Cybercrime Gang
  • InFraud Cybercrime Syndicate
  • InFraud Organization
  • InqTana Mac OS X Malware
  • Insider
  • Insider Monitoring
  • Insider Threat
  • Instant Messaging
  • Intellectual Property
  • Intelligence
  • Intelligence Agency
  • Intelligence Community
  • Internal Revenue Service
  • International Exploit Shop
  • Internet
  • Internet Censorship
  • Internet Economy
  • Internet Relay Chat
  • Investment Banking
  • IoC
  • IP Cloaking
  • IP Hiding
  • IP Spoofing
  • iPowerWeb
  • IPSec
  • IPv4
  • IPv6
  • Iran
  • Iran Election
  • Iran Election 2009
  • Iran Hacker Groups
  • Iran Hacking Groups
  • Iran Mabna Hackers
  • IRC
  • IRS
  • ISIS
  • Israel
  • Jabber
  • JabberZeuS
  • Javor Kolev
  • Jeffrey Carr
  • Joanna Rutkowska
  • Johannes Ullrich
  • John Young
  • K Rudolph
  • Kaseya
  • Kaseya Ransomware Attack
  • Katrina
  • Keylogger
  • KGB
  • Kidnapping
  • Koobface
  • Koobface Botnet
  • Korean Demilitarized Zone
  • KrotReal
  • Latest News Articles
  • Latvia
  • Law Enforcement
  • Lawful Interception
  • Leaks
  • Lenovo
  • Liberty Front Press Network
  • Lizamoon
  • Loads.cc
  • Localization
  • Location Tracking
  • Lockheed Martin
  • Logicube
  • Lone Gunmen
  • Lovely Horse
  • Lubyanka Square Headquarters
  • M4 Project
  • Mac OS X
  • Malicious Software
  • Maltego
  • Maltego Graphs
  • Malvertising
  • Malware
  • Malware Information Sharing Platform
  • Marketing
  • Mass Web Site Defacement
  • Mastercard
  • McAfee
  • MD5
  • Media Methane
  • Memoir
  • Metrics
  • Microsoft
  • Microsoft Live
  • Military Communications
  • Ministry of Interior
  • MISP
  • Missile Base
  • Mobile
  • Mobile Application
  • Mobile Communication Censorship
  • Mobile Internet
  • Mobile Location Tracking
  • Mobile Malware
  • Mobile Security
  • Mohammad Sagegh Ahmadzadegan
  • Money Laundering
  • Money Mule
  • Money Mule Recruitment
  • Monoculture
  • Morgan Stanley
  • Moses Staff
  • Most Wanted Cybercriminals
  • MSN
  • MSRC
  • MSRC Researcher Recognition Program
  • Muhammad Cartoons
  • MVR
  • MyWebFace
  • NASA
  • National Cyber Security Centre
  • National Security
  • Native Intelligence
  • NBC
  • NCSC
  • NetAssist LLC
  • NetCraft
  • Network Centric Warfare
  • Network Solutions
  • New Media
  • Nikolay Nedyalkov
  • Nikopol Trilogy
  • Nintendo
  • Nintendo DS
  • NordVPN
  • Norman Sandbox
  • North Korea
  • North Korea Missile Launch Pad
  • NSA
  • NSO Group
  • NSO Group Spyware
  • Nuclear Weapons
  • Nyxem
  • OEM
  • Offensive Cyber Warfare
  • OMEMO
  • Omerta
  • One-Time Password
  • One-Time Passwords In Everything
  • OneCare
  • Online Advertising
  • Online Fraud
  • Online Marketing
  • Online Propaganda Campaign
  • Online Scam
  • Open Source Malware
  • Operation EQUALIZER
  • Operation Uncle George
  • OPIE
  • OPSEC
  • Osama Bin Laden
  • OSINT
  • OSINT Training
  • OTC
  • OTP
  • Over-The-Counter
  • Packers
  • Parked Domains
  • Passwords
  • Pavlin Georgiev
  • Pay Per Install
  • PayPal
  • Perplex City
  • Persistent Cookies
  • Personal Career
  • Personal Data
  • Pharmaceutical Scams
  • Phileas Crawler
  • Phishing
  • Phishing Campaign
  • Phishing Domain Farm
  • Phishing Toolbar
  • PhishTube
  • Phreedom
  • Physical Security
  • Pinterest
  • Piracy
  • PlushForums
  • Podcast
  • Point of Sale Terrminal
  • Politics
  • PornTube
  • POS
  • Potentially Unwanted Application
  • PR
  • Press Coverage
  • Privacy
  • Project RAHAB
  • Prolexic
  • Protonmail
  • Proxy Service
  • Psychedelic Trance
  • PSYOPS
  • Psytrance
  • Psytrance Song of the Day
  • Qassam Cyber Fighters
  • Radicati Group
  • Ransomware
  • RAT
  • Ray Kurzweil
  • RBN
  • Reconnaissance Satellite
  • Red Joan
  • Regulation
  • Remote Access Tool
  • Reporters Without Borders
  • Return On Investment
  • Return On Security Investment
  • REvil Ransomware Group
  • Revolution in Militvry Affairs
  • RIPA
  • Risk Management
  • Rogue Account
  • Rogue Chrome Extension
  • Rogue Facebook Appeal
  • Rogue Security Software
  • Rogue Video Codec
  • Rogue YouTube Player
  • Rogueware
  • ROI
  • Roman Polesek
  • Root Server
  • Rootkit
  • ROSI
  • RSA
  • RSA Conference
  • Russia
  • Russia Small Group
  • Russian
  • Russian Bomber
  • Russian Business Network
  • Russian Submarine
  • Safe Harbor
  • Satellite Imagery
  • Satellite Jamming
  • Satellite SIGINT
  • Scam
  • Scams
  • Scandoo
  • ScanSafe
  • Scareware
  • Scientific Intelligence
  • Scribd
  • Search Engine
  • Search Engine Optimization
  • SEC
  • SecondEye Solutions
  • Secret Service
  • Secure Communication
  • SecureDrop
  • Securities and Exchange Commission
  • Security
  • Security Awareness
  • Security Book
  • Security Breach
  • Security Conference
  • Security Directory
  • Security Education
  • Security Event
  • Security Forum
  • Security Game
  • Security Industry
  • Security Interviews
  • Security Investment
  • Security Metrics
  • Security Podcast
  • Security Project
  • Security Research
  • Security Statistics
  • Security Training
  • Security Trends
  • Sensitive Information
  • SEO
  • Shadow Server
  • ShadowCrew
  • SIGINT
  • Silent Circle
  • Sipco Systems
  • SIPRNET
  • SITE Institute
  • SiteAdvisor
  • Skype
  • Sniffing
  • Social Engineering
  • Social Network Analysis
  • SocialMediaSystem
  • Software Piracy
  • Solarwinds
  • Song of the Day
  • Sophos
  • Soviet Union
  • Space Warfare
  • Space Weapons
  • Spam
  • Spam Campaign
  • Spam Operations
  • Spear Phishing
  • Spoofing
  • Sprott Asset Management
  • Spyware
  • SQL Injection
  • SSL
  • SSN
  • Stalkware
  • Starlight
  • Stealth Ideas Inc
  • Steganography
  • STIX
  • STIX2
  • Stolen Credit Card
  • Stolen Credit Cards
  • Stolen Gift Cards
  • Strider Crawler
  • Sub7
  • Suri Pluma
  • Surveillance
  • Swine Flu
  • Symantec
  • Symbian
  • Syria
  • Syrian Electronic Army
  • Syrian Embassy
  • Taia Global
  • TAN
  • TAXII
  • TDoS
  • Team Code Zero
  • Team Code Zero Hacking Group
  • Tech Support Scam
  • Technical Collection
  • Technical Mujahid
  • Telephony Denial of Service Attack
  • Terrorism
  • th3j35t3r
  • THAAD
  • The Bunker
  • The Immortals
  • The Lawnmower Man
  • The Outer Limits
  • Thought Leadership
  • Thousand Talents Program
  • Threat Intelligence
  • Threat Intelligence Feed
  • Threat Intelligence Report
  • TIA
  • Tipping Point
  • Top Secret Program
  • Tor
  • Tor Project
  • Torrent
  • TorrentReactor
  • Total Information Awareness
  • Travel Without Moving
  • TrendMicro
  • Trickbot
  • Trickbot Gang
  • Trickbot Malware
  • Trickbot Malware Gang
  • Trifinite Group
  • Trojan Horse
  • TROYAK-AS
  • Tutanota
  • Twitter
  • Two Factor Authentication
  • Two-Factor Authentication
  • Typosquatting
  • U.K National Cyber Security Centre
  • U.S Bureau of Engraving and Printing
  • U.S Cyber Command
  • U.S Driving License
  • U.S Elections
  • U.S Sanctions
  • U.S Secret Service
  • Underground Search Engine
  • United Kingdom
  • University ID Card
  • Vasil Moev Gachevski
  • Vault 7
  • VeriSign
  • Vertex Net Loader
  • Virtual Private Network
  • Virtual Reality
  • Virtual Reality Social Network
  • Virtual World
  • Virus
  • Virus for You
  • Virus Map
  • Virus Recovery Button
  • Viruses
  • VirusTotal
  • Visa
  • Visual Information System
  • Visualization
  • Void Balaur Malware Gang
  • VoIP
  • VPN
  • Vulnerabilities
  • Vulnerability Broker
  • War Driving
  • War Games
  • Weapon Systems
  • Web 2.0
  • Web Application Worm
  • Web Crawler
  • Web Inject
  • Web Proxy Service
  • Web Shells
  • Web Site Defacement
  • Web Site Defacement Groups
  • Webroot
  • WHGDG
  • WhoisXML API
  • WhoisXML API Jabber ZeuS Gang
  • Wireless
  • Wireless Hacking
  • Wireless Internet
  • Wiretapping
  • WMF Vulnerability
  • World Hacker Global Domination Group
  • X-Files
  • X-Tunnel
  • XMPP
  • XSS
  • Yahoo
  • Yaroslav Vasinskyi
  • Yavor Kolev
  • YouTube
  • ZDNet
  • ZDNet Zero Day Blog
  • Zero Day Exploit
  • Zero Day Initiative
  • Zerodium
  • ZeuS
  • Zombie Alert
  • Zone-H
  • Zotob
Clicky
Awesome Inc. theme. Powered by Blogger.