Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude

Showing posts with label Two-Factor Authentication. Show all posts
Showing posts with label Two-Factor Authentication. Show all posts
Friday, July 19, 2013

A Peek Inside a Managed OTP/ATS/TAN Token Bypassing/Hijacking/Blocking System as a (Licensed) Service

›
One of the most common questions that I get during Q&A sessions after a PPT, or in a face-to-face conversation is - " Hello, my ...
Thursday, February 16, 2006

The end of passwords - for sure, but when?

›
My first blog post " How to create better passwords - why bother?! " back in December, 2005, tried to briefly summarize my thought...
Wednesday, December 07, 2005

How to create better passwords - why bother?!

›
I have recently came across a practical article on how to create a better passwords , couresy of CSO Magazine . It reminded me of how many ...
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.