Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, June 27, 2006

Malicious Web Crawling

›
SiteAdvisor indeed cashed for evaluating the maliciosness of the web , and New Zealand feels that nation wide google hacking initiatives ar...

Shots From the Wild - Terrorism Information Awareness Program Demo Portal

›
A lot has changed since my last post on " Data mining, terrorism and security ", namely NSA's warrantless surveillance efforts...
Monday, June 26, 2006

Dealing with Spam - The O'Reilly.com Way

›
While China feels that centralization is the core of everything, and is licensing the use of mail servers to fight spam , thus totally ignor...

Big Brother in the Restroom

›
Wikes! This is nasty, and while the porn industry has commercialized the idea a long time ago, I never imagined the levels of crime in publi...

World's Internet Censorship Map

›
While it seems rather quiet on the Internet's censorship front, the media coverage on the topic represents a cyclical buzz that reemerg...
Sunday, June 25, 2006

Delicious Information Warfare - 13/24 June

›
Brief summaries of key events for the last week and a half, catch up with previous ones as well. I intend to continue sharing my daily read...

Travel Without Moving - Erasmus Bridge

›
Catching up with last week's Travel Without Moving shot, this one isn't intelligence of military related, but a marvelous engineer...
Saturday, June 24, 2006

No Other Place Like 127.0.0.1

›
Sincere apologies for the sudden disappearance, but thanks for the interest even though I haven't been active for the last week due to q...
Tuesday, June 13, 2006

Web Application Email Harvesting Worm

›
This is a rare example of a web application vulnerability worm , targeting one of the most popular free email providers by harvesting emails...

Consolidation, or Startups Popping out Like Mushrooms?

›
If technology is the enabler, and the hot commodity these days, spammers will definitely twist the concept of targeted marketing, while taki...
Sunday, June 11, 2006

It's Getting Cloudy, and Delicious

›
For real . A brief summary of the instant links for the last two days : 01. Eight Indian Startups to Watch - "Some startups are offe...

Travel Without Moving - Georgi Markov's KGB Assassination Spot

›
In the spirit of the previous hot spot in the Travel Without Moving series, here's another one, this time Georgi Markov's KGB Assas...
Saturday, June 10, 2006

Going Deeper Underground

›
IT Security Goes Nuclear, at least that's what they say . " Venture capitalists are predicting a "business boom below ground...

There You Go With Your Financial Performance Transparency

›
Truly amazing, and the inavitable consequence of communication retention in the financial sector, but I feel it's the magnitude that re...

All Your Confidentiality Are Belong To Us

›
The proof that commercial and open source encryption has surpassed the technologies to police it , or the idea that privacy and business gro...
Friday, June 09, 2006

Brace Yourself - AOL to Enter Security Business

›
In the re-emergence of the Web, AOL got the attention it never imagined it would get, Microsoft and Google fighting for a share of its mode...
Thursday, June 08, 2006

An Over-performing Spammer

›
Th3 4r7 0f $3nd!ng spam messages is evolving like never before, and while spammers are still catching up with the newest technologies such a...

Bedtime Reading - Rome Inc.

›
If the Baby Business helped you envision the future, " Rome Inc - The Rise and Fall of the First Multinational Corporation " is g...
Tuesday, June 06, 2006

Phantom Planes in the Skies

›
I can barely imagine the panic with a non-responding -- can it respond when it's not there? -- plane in the sky, at least by the time a ...

Where's my Fingerprint, Dude?

›
Personal data security breaches continue occurring, and with the trend towards evolving to a digital economy, it's inevitably going to...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.