Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, May 28, 2006

Who's Who in Cyber Warfare?

›
Wondering what's the current state of cyber warfare capabilities of certain countries, I recently finished reading a report " Cyber...
Saturday, May 27, 2006

Delaying Yesterday's "0day" Security Vulnerability

›
I never imagined we would be waiting for the release of a "0day" vulnerability, but I guess that's what happens if you're ...

Forgotten Security

›
It's one thing to expose a Pengaton conference's attendees list , and another Mr. Blair's security plans intended to protect the...

Aha, a Backdoor!

›
Security precautions can indeed blur the transparency of a company's financial performance -- one that's extremely important in the ...

Travel Without Moving - Korean Demilitarized Zone

›
Continuing the travel without moving series , the Korean Demilitarized Zone remains a hot spot with North Korea publicly stating its ambti...
Tuesday, May 23, 2006

Bedtime Reading - The Baby Business

›
While not necessarily an AI , a Project 2501 type of living entity breakthrough development, there's a growing (underground) market for...

The Current, Emerging, and Future State of Hacktivism

›
Zone-H recently reported yet another major hacktivism case in what's stated to be the biggest hacking incident in the web-hosting histo...

Arabic Extremist Group Forum Messages' Characteristics

›
Ever wondered what's the font size of a terrorist forum posting? These guys are really deep into using AI for gathering intelligence on ...

Espionage Ghosts Busters

›
In previous posts, " Insider Competition in the Defense Industry ", and " The anti virus industry's panacea - a virus rec...

Nation Wide Google Hacking Initiative

›
The idea of doing reconnaissance for the purpose of pen testing or malicious activity through google hacking, has already reached levels of ...
Monday, May 22, 2006

Travel Without Moving - Cheyenne Mountain Operations Center

›
It's a small world -- and a busy one, this post was supposed to appear the previous week so here it goes. There are certain places you ...
Tuesday, May 16, 2006

Techno Imperialism and the Effect of Cyberterrorism

›
It's been a while since I've last blogged about Cyberterrorism , and while many did mentioned the topic in between the recent DRDoS...

Insider Competition in the Defense Industry

›
While there aren't any smoking emails mentioned in this case, where else can we spot insiders if not in the defense industry, an indus...

EMP Attacks - Electronic Domination in Reverse

›
Yesterday, I came across to an updated(April 14, 2006) CRS report - High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM...
Monday, May 15, 2006

Valuing Security and Prioritizing Your Expenditures

›
I often blog on various market trends related to information security and try to provide an in-depth coverage of emerging or current trends ...
Friday, May 12, 2006

Terrorist Social Network Analysis

›
In previous posts " Visualization, Intelligence and the Starlight project " and " Visualization in the Security and New Media...
Thursday, May 11, 2006

Travel Without Moving - Scratching the Floor

›
You don't really need a reconnaissance satellite to spot this, it's precisely the type of "sight" you can see for yoursel...

Pocket Anonymity

›
While the threats posed by improper use of removable media will continue to make headlines, here's a company that's offering the com...

Is Bin Laden Lacking a Point?

›
If I were to name the masters of PSYOPS, that would be terrorists, who without a super power's financial capabilities still manage to ac...

Pass the Scissors

›
Counterfeiting U.S currency is a profitable business given its stability and actual valuation, and so is money printing ! It's just tha...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.