Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, June 09, 2006

Brace Yourself - AOL to Enter Security Business

›
In the re-emergence of the Web, AOL got the attention it never imagined it would get, Microsoft and Google fighting for a share of its mode...
Thursday, June 08, 2006

An Over-performing Spammer

›
Th3 4r7 0f $3nd!ng spam messages is evolving like never before, and while spammers are still catching up with the newest technologies such a...

Bedtime Reading - Rome Inc.

›
If the Baby Business helped you envision the future, " Rome Inc - The Rise and Fall of the First Multinational Corporation " is g...
Tuesday, June 06, 2006

Phantom Planes in the Skies

›
I can barely imagine the panic with a non-responding -- can it respond when it's not there? -- plane in the sky, at least by the time a ...

Where's my Fingerprint, Dude?

›
Personal data security breaches continue occurring, and with the trend towards evolving to a digital economy, it's inevitably going to...
Sunday, June 04, 2006

Skype as the Attack Vector

›
It's often hard to actually measure the risk exposure to a threat, given how overhyped certain market segments/products' insecuritie...

Travel Without Moving - KGB Lubyanka Headquarters

›
Yet another hot spot in this week's Travel Without Moving series - this time it's Lubyanka Square's KGB Headquarters . There a...
Saturday, June 03, 2006

May's Security Streams

›
Here's May's summary of all the security streams during the month. This is perhaps among the few posts in which I can actually say s...
Wednesday, May 31, 2006

Healthy Paranoia

›
More developments on the US-China Commission's decision not to use Chinese manufactured PCs on the SIRPnet follow, an event I covered in...
Tuesday, May 30, 2006

The Global Security Challenge - Bring Your Know-How

›
It's a public secret that the majority of innovative ideas come from either the academic enviroment, or plain simple entrepreneurial spi...

Covert Competitive Intelligence

›
Yet another agreement on alleged covert competitive intelligence , this time , " WestJet Airlines says it’s sorry that members of its m...

Microsoft in the Information Security Market

›
Microsoft is emptying its pockets with tiny acquisitions of security solution providers with the idea to target the masses in its all-in-on...

No Anti Virus Software, No E-banking For You

›
Malware and Phishing are the true enemies of E-commerce, its future penetration , and E-banking altogether. Still, there are often banks ...
Sunday, May 28, 2006

Who's Who in Cyber Warfare?

›
Wondering what's the current state of cyber warfare capabilities of certain countries, I recently finished reading a report " Cyber...
Saturday, May 27, 2006

Delaying Yesterday's "0day" Security Vulnerability

›
I never imagined we would be waiting for the release of a "0day" vulnerability, but I guess that's what happens if you're ...

Forgotten Security

›
It's one thing to expose a Pengaton conference's attendees list , and another Mr. Blair's security plans intended to protect the...

Aha, a Backdoor!

›
Security precautions can indeed blur the transparency of a company's financial performance -- one that's extremely important in the ...

Travel Without Moving - Korean Demilitarized Zone

›
Continuing the travel without moving series , the Korean Demilitarized Zone remains a hot spot with North Korea publicly stating its ambti...
Tuesday, May 23, 2006

Bedtime Reading - The Baby Business

›
While not necessarily an AI , a Project 2501 type of living entity breakthrough development, there's a growing (underground) market for...

The Current, Emerging, and Future State of Hacktivism

›
Zone-H recently reported yet another major hacktivism case in what's stated to be the biggest hacking incident in the web-hosting histo...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.