Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, May 15, 2006

Valuing Security and Prioritizing Your Expenditures

›
I often blog on various market trends related to information security and try to provide an in-depth coverage of emerging or current trends ...
Friday, May 12, 2006

Terrorist Social Network Analysis

›
In previous posts " Visualization, Intelligence and the Starlight project " and " Visualization in the Security and New Media...
Thursday, May 11, 2006

Travel Without Moving - Scratching the Floor

›
You don't really need a reconnaissance satellite to spot this, it's precisely the type of "sight" you can see for yoursel...

Pocket Anonymity

›
While the threats posed by improper use of removable media will continue to make headlines, here's a company that's offering the com...

Is Bin Laden Lacking a Point?

›
If I were to name the masters of PSYOPS, that would be terrorists, who without a super power's financial capabilities still manage to ac...

Pass the Scissors

›
Counterfeiting U.S currency is a profitable business given its stability and actual valuation, and so is money printing ! It's just tha...

Snooping on Historical Click Streams

›
In a previous post " The Feds, Google, MSN's reaction, and how you got "bigbrothered"? I gave practical advices on how c...
Tuesday, May 09, 2006

Wiretapping VoIP Order Questioned

›
There's been a lot of buzz recently on the FCC's order requiring all VoIP providers to begin compliance with CALEA in order to la...

The Cell-phone Industry and Privacy Advocates VS Cell Phone Tracking

›
I've once mentioned various privacy issues related to mobile devices , the growing trend of "assets tracking", and of course, ...
Monday, May 08, 2006

Shaping the Market for Security Vulnerabilities Through Exploit Derivatives

›
In a previous post " 0bay - how realistic is the market for security vulnerabilities? " I gave a brief overview of the current mar...
Thursday, May 04, 2006

The Current State of Web Application Worms

›
Remeber the most recent Yahoo! Mail's XSS vulnerabilities , or the MySpace worm ? I just read through a well written summary on Web App...

Travel Without Moving - Typhoon Class Submarines

›
In previous posts " Security quotes : a FSB (successor to the KGB) analyst on Google Earth ", " Suri Pluma - a satellite imag...
Wednesday, May 03, 2006

Biased Privacy Violation

›
This is a very interesting initiative, going beyond the usual MySpace's teen heaven privacy issues, but directly exposing the mature a...
Tuesday, May 02, 2006

April's Security Streams

›
Hi folks, it's about time to quickly summarize April's Security Streams. As of today, my blog is officially six months old and the f...
Thursday, April 27, 2006

A comparison of US and European Privacy Practices

›
A new study on " US and European Corporate Privacy Practices " was released two days ago, and as I constantly monitor the topic k...

DIY Marketing Culture

›
Problem - big name advertising agencies, and self forgotten copywriters easily turn into an obstacle for a newly born startup, the way mark...
Wednesday, April 26, 2006

In between the lines of personal and sensitive information

›
In a previous post, " Give it back! " I mentioned the ongoing re-classification of declassified information and featured some pub...
Tuesday, April 25, 2006

Wild Wild Underground

›
Where's the real underground these days, behind the shadows of the ShadowCrew , the revenge of the now, for-profit script kiddies, or in...
Monday, April 24, 2006

25 ways to distinguish yourself -- and be happy?

›
Totally out of the security world, yet very relevant inspirational tips for all readers feeling down, or looking for more sources of self-es...

Why's that radar screen not blinking over there?

›
Two days ago, the Russian News & Information Agency - Novosti, reported on how " Russian bombers flew undetected across Arctic ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.