Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, July 16, 2006

Weaponizing Space and the Emerging Space Warfare Arms Race

›
Satellites Jamming, Hijacking, Space SIGINT, Space Kill Vehicles are just the tip of the iceberg in the ongoing weaponization of Space. In p...

Scientifically Predicting Software Vulnerabilities

›
I recently came across to a research on " Modeling the Vulnerability Discovery Process " discussing : " A few models for the ...

North Korea's Cyber Warfare Unit 121

›
In a previous post, " Who's Who in Cyber Warfare " I commented on a very informative research on the topic, and pointed out t...
Friday, July 14, 2006

Spreading Psychological Imagination Streams

›
Wish I could reference all the copywriting materials I've ever written and got commissioned for, but I'd rather we play a "word...
Monday, July 10, 2006

India's Espionage Leaks

›
You may find this brief overview of Indian security's leaky past cases informative : - " Defence Research and Development Organisa...

South Korea's View on China's Media Control and Censorship

›
Got bored of China's Internet censorship efforts , and its interest to control mobile communications as well? I haven't, and I doub...
Sunday, July 09, 2006

Security Research Reference Coverage

›
I’ve recently started getting more requests on participating or guiding to a certain extend, student theses and various other research paper...
Saturday, July 08, 2006

Delicious Information Warfare - 27/07

›
Given the interest in the perspective, I'm continuing to share my daily reads for the last week and a half. Catch up with previous summ...
Thursday, July 06, 2006

$960M and the FBI's Art of Branding Insecurity

›
In previous posts " Are cyber criminals or bureaucrats the industry's top performer? ", and " Insiders - insights, trends...

Travel Without Moving - North Korea Missile Launch Pad

›
Seems like it's North Korea's most active PR month given the public outbreak due to their unsuccessful launch of an intercontinenta...
Wednesday, July 05, 2006

How to Win the U.S Elections

›
Juicy barbecues, hugging babies, in between offering, and asking for the Moon days are over. E-voting is the future of technological politic...
Monday, July 03, 2006

BBC under the Intelligence Shadow

›
Nothing is impossible, the impossible just takes a little while. A relatively typical practices for the ex-USSR, namely controlling the medi...
Sunday, July 02, 2006

China's Interest of Censoring Mobile Communications

›
Just came across to a great article at the IHT on China's interest of tightening control of cellphones : " The new measures bein...
Saturday, July 01, 2006

Hacktivism Tensions - Israel vs Palestine Cyberwars

›
Oops, they did it again . The most recent case of hacktivism recently occurred : " Shortly after IDF tanks rolled into Gaza, another...
Friday, June 30, 2006

Real-Time PC Zombie Statistics

›
Zombies inevitably turning into botnets represent a huge, automated and efficient advantage to malicious attackers , I topic and most of it...

The WarDriving Police and Pringles Hacking

›
These days you never know where the next hacking attempt on your wireless network may come from. In this case, it's from the police, as ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.