Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, June 06, 2006

Phantom Planes in the Skies

›
I can barely imagine the panic with a non-responding -- can it respond when it's not there? -- plane in the sky, at least by the time a ...

Where's my Fingerprint, Dude?

›
Personal data security breaches continue occurring, and with the trend towards evolving to a digital economy, it's inevitably going to...
Sunday, June 04, 2006

Skype as the Attack Vector

›
It's often hard to actually measure the risk exposure to a threat, given how overhyped certain market segments/products' insecuritie...

Travel Without Moving - KGB Lubyanka Headquarters

›
Yet another hot spot in this week's Travel Without Moving series - this time it's Lubyanka Square's KGB Headquarters . There a...
Saturday, June 03, 2006

May's Security Streams

›
Here's May's summary of all the security streams during the month. This is perhaps among the few posts in which I can actually say s...
Wednesday, May 31, 2006

Healthy Paranoia

›
More developments on the US-China Commission's decision not to use Chinese manufactured PCs on the SIRPnet follow, an event I covered in...
Tuesday, May 30, 2006

The Global Security Challenge - Bring Your Know-How

›
It's a public secret that the majority of innovative ideas come from either the academic enviroment, or plain simple entrepreneurial spi...

Covert Competitive Intelligence

›
Yet another agreement on alleged covert competitive intelligence , this time , " WestJet Airlines says it’s sorry that members of its m...

Microsoft in the Information Security Market

›
Microsoft is emptying its pockets with tiny acquisitions of security solution providers with the idea to target the masses in its all-in-on...

No Anti Virus Software, No E-banking For You

›
Malware and Phishing are the true enemies of E-commerce, its future penetration , and E-banking altogether. Still, there are often banks ...
Sunday, May 28, 2006

Who's Who in Cyber Warfare?

›
Wondering what's the current state of cyber warfare capabilities of certain countries, I recently finished reading a report " Cyber...
Saturday, May 27, 2006

Delaying Yesterday's "0day" Security Vulnerability

›
I never imagined we would be waiting for the release of a "0day" vulnerability, but I guess that's what happens if you're ...

Forgotten Security

›
It's one thing to expose a Pengaton conference's attendees list , and another Mr. Blair's security plans intended to protect the...

Aha, a Backdoor!

›
Security precautions can indeed blur the transparency of a company's financial performance -- one that's extremely important in the ...

Travel Without Moving - Korean Demilitarized Zone

›
Continuing the travel without moving series , the Korean Demilitarized Zone remains a hot spot with North Korea publicly stating its ambti...
Tuesday, May 23, 2006

Bedtime Reading - The Baby Business

›
While not necessarily an AI , a Project 2501 type of living entity breakthrough development, there's a growing (underground) market for...

The Current, Emerging, and Future State of Hacktivism

›
Zone-H recently reported yet another major hacktivism case in what's stated to be the biggest hacking incident in the web-hosting histo...

Arabic Extremist Group Forum Messages' Characteristics

›
Ever wondered what's the font size of a terrorist forum posting? These guys are really deep into using AI for gathering intelligence on ...

Espionage Ghosts Busters

›
In previous posts, " Insider Competition in the Defense Industry ", and " The anti virus industry's panacea - a virus rec...

Nation Wide Google Hacking Initiative

›
The idea of doing reconnaissance for the purpose of pen testing or malicious activity through google hacking, has already reached levels of ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.