Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, May 16, 2006

Techno Imperialism and the Effect of Cyberterrorism

›
It's been a while since I've last blogged about Cyberterrorism , and while many did mentioned the topic in between the recent DRDoS...

Insider Competition in the Defense Industry

›
While there aren't any smoking emails mentioned in this case, where else can we spot insiders if not in the defense industry, an indus...

EMP Attacks - Electronic Domination in Reverse

›
Yesterday, I came across to an updated(April 14, 2006) CRS report - High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM...
Monday, May 15, 2006

Valuing Security and Prioritizing Your Expenditures

›
I often blog on various market trends related to information security and try to provide an in-depth coverage of emerging or current trends ...
Friday, May 12, 2006

Terrorist Social Network Analysis

›
In previous posts " Visualization, Intelligence and the Starlight project " and " Visualization in the Security and New Media...
Thursday, May 11, 2006

Travel Without Moving - Scratching the Floor

›
You don't really need a reconnaissance satellite to spot this, it's precisely the type of "sight" you can see for yoursel...

Pocket Anonymity

›
While the threats posed by improper use of removable media will continue to make headlines, here's a company that's offering the com...

Is Bin Laden Lacking a Point?

›
If I were to name the masters of PSYOPS, that would be terrorists, who without a super power's financial capabilities still manage to ac...

Pass the Scissors

›
Counterfeiting U.S currency is a profitable business given its stability and actual valuation, and so is money printing ! It's just tha...

Snooping on Historical Click Streams

›
In a previous post " The Feds, Google, MSN's reaction, and how you got "bigbrothered"? I gave practical advices on how c...
Tuesday, May 09, 2006

Wiretapping VoIP Order Questioned

›
There's been a lot of buzz recently on the FCC's order requiring all VoIP providers to begin compliance with CALEA in order to la...

The Cell-phone Industry and Privacy Advocates VS Cell Phone Tracking

›
I've once mentioned various privacy issues related to mobile devices , the growing trend of "assets tracking", and of course, ...
Monday, May 08, 2006

Shaping the Market for Security Vulnerabilities Through Exploit Derivatives

›
In a previous post " 0bay - how realistic is the market for security vulnerabilities? " I gave a brief overview of the current mar...
Thursday, May 04, 2006

The Current State of Web Application Worms

›
Remeber the most recent Yahoo! Mail's XSS vulnerabilities , or the MySpace worm ? I just read through a well written summary on Web App...

Travel Without Moving - Typhoon Class Submarines

›
In previous posts " Security quotes : a FSB (successor to the KGB) analyst on Google Earth ", " Suri Pluma - a satellite imag...
Wednesday, May 03, 2006

Biased Privacy Violation

›
This is a very interesting initiative, going beyond the usual MySpace's teen heaven privacy issues, but directly exposing the mature a...
Tuesday, May 02, 2006

April's Security Streams

›
Hi folks, it's about time to quickly summarize April's Security Streams. As of today, my blog is officially six months old and the f...
Thursday, April 27, 2006

A comparison of US and European Privacy Practices

›
A new study on " US and European Corporate Privacy Practices " was released two days ago, and as I constantly monitor the topic k...

DIY Marketing Culture

›
Problem - big name advertising agencies, and self forgotten copywriters easily turn into an obstacle for a newly born startup, the way mark...
Wednesday, April 26, 2006

In between the lines of personal and sensitive information

›
In a previous post, " Give it back! " I mentioned the ongoing re-classification of declassified information and featured some pub...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.