Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, January 19, 2006

Why relying on virus signatures simply doesn't work anymore?

›
As a fan of VirusTotal and Norman's Sandbox being always handy when making analyses or conclusions, and me looking for metrics and ...

FBI's 2005 Computer Crime Survey - what's to consider?

›
Yesterday, the FBI has released their Annual 2005 Computer Crime Survey , and while I bet many other comments will also follow, I have dec...
Tuesday, January 17, 2006

China - the biggest black spot on the Internet’s map

›
Chinese Internet users have the potential to outpace the number of the U.S Internet population, yet, the majority of them still remain b...

What are botnet herds up to?

›
Johannes B. Ullrich , with whom I had a chat once, did a great post providing us with real-life botnet herds "know how" or the...
Monday, January 16, 2006

Anonymity or Privacy on the Internet?

›
Last week, Bruce Schneier wrote a great comment on Anonymity, how it won’t kill the Internet, and that it has to do with accountability mo...

To report, or not to report?

›
Computerworld is running a story that, “ Three more U.S states add laws on data breaches ”, but what would be the consequences of this ac...

Future Trends of Malware

›
Great news, that I greatly anticipated, my " Malware - Future Trends " research got Slashdotted . The strange thing is how my ...
Thursday, January 12, 2006

Insecure Irony

›
What’s the worst thing that could happen to BigBrother and any of its puppets? – Have their confidential info exposed due to the neglige...

Security threats to consider when doing E-Banking

›
E-banking, and mobile commerce are inevitable part of our daily lifes, and would continue to get more popular.  The bad thing is, t...
Wednesday, January 11, 2006

The hidden internet economy

›
How much does phishing, spam and spyware for instance cost on businesses? Should we measure in cash, or hardly quantified long-term affec...
Tuesday, January 10, 2006

The never-ending "cookie debate"

›
On the 6th of January, CNET reported that the web sites of 23 U.S senators use persistent cookies (usually expiring around 2035), and se...

Why we cannot measure the real cost of cybercrime?

›
At the end of 2005, a rather contradictive statement was made, namely, that the costs of cybercrime have surpassed those of drug smuggl...

Would we ever witness the end of plain text communications?

›
Last week, a report released by the research firm In-Sat estimated that revenues for IP VPNs will double between 2004 and 2009 to $658 mill...

Watch out your wallets!

›
The irony of today's, obviously not working loan system, has left a 22 years old Chicago student in debt of $412,000 . A very scary ev...
Monday, January 09, 2006

Malware - future trends

›
I'm very excited to let you know that, I have finally managed to release my "Malware - future trends" publication. Basicall...
Wednesday, January 04, 2006

How to secure the Internet

›
I recently wondered, are there any existing government practices towards securing the entire Internet? So I went though the U.S National ...

Security quotes : a FSB (successor to the KGB) analyst on Google Earth

›
"Lt. Gen. Leonid Sazhin, an analyst for the Federal Security Service, the Russian security agency that succeeded the K.G.B., was quo...

Keep your friends close, your intelligence buddies closer!

›
Too much power always leads you to the dark side! Cryptome has yesterday featured a excerpt from " State of the War : The Secret ...

What's the potential of the IM security market? Symantec thinks big

›
Yesterday, Symantec, one of the world's leading security, and of course, storage providers aquired IMlogic , a leading provide of Insta...

Happy New Year folks!!

›
Dear friends and visitors, Happy New Year and sincere apologies for the lack of updates on my blog recently. It's not that I have so...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.