Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, August 04, 2006

Mobile Devices Hacking Through a Suitcase

›
Define:nerd " Luca Carettoni and Claudio Merloni are security consultants at Milan, Italy-based Secure Network. The two created the Bl...
Thursday, August 03, 2006

Achieving Information Warfare Dominance Back in 1962

›
The point here isn't the consolidation indicated in the article : " The consolidation involves Singer’s headquarters staff, and su...

One Time Password Generating Credit Card

›
This is cute as it solves a major problem with customers having to use, and more easily lose tokens. Neat integration with the push of a but...
Wednesday, August 02, 2006

But Of Course It's a Pleasant Transaction

›
Great example of automated bots attacking Ebay's core trust establishing process - the feedbacks provided by users taking advantage of t...
Monday, July 31, 2006

Things Money Cannot Buy

›
1. Love with tingles 2. True Friends 3. Respect , one when the results go beyond the position and size of market capitalization 4. Style 5....

Japan's Reliance on U.S Spy Satellites and Early Warning Missile Systems

›
With China breathing down Japan's neck, and North Korea crying for attention by actively experimenting with symmetric and asymmetric wa...
Sunday, July 30, 2006

DVD of the Weekend - Path to War

›
As I've been busy catching up with way too many things to list them, I'd better finalize my creativity efforts and provide you with ...
Thursday, July 27, 2006

The Beauty of the Surrealistic Spam Art

›
Given the volume of spam representing over 50% of the world's email traffic, obviously to some it represents a huge sample to draw sadne...
Wednesday, July 26, 2006

Splitting a Botnet's Bandwidth Capacity

›
Metaphorically speaking, I always say that the masssess of end users' bandwidth is reaching that of a mid size ISP, while the lack of in...
Tuesday, July 25, 2006

Latest Report on Click Fraud

›
Google does have countless features, and it's not even considering to stop rolling new ones, but the secret to its huge market capitaliz...
Monday, July 24, 2006

An Intergalactic Security Statement

›
Hell of a comment on the Malware Search Engine . Hackers crack secret Google malware search codes : " Hidden malware search capabiliti...
Friday, July 21, 2006

Searching for Source Code Security Vulnerabilities

›
While Google was quick enough to censor the colourful Malware Search logo -- colourful branding -- here's another recently started ini...

Detailed Penetration Testing Framework

›
This framework is simply amazing, as it takes you through the entire process of penetration testing , step-by-step in between references to ...

Anti Virus Signatures Update - It Could Wait

›
It's a common myth that all AV vendors exchange the malware they come across in between themselves, whereas that's obviously not alw...

When Financial and Information Security Risks are Supposed to Intersect

›
Interesting security event at Morgan Stanley's NYC headquarters related to insider abuse, mostly interesting because the clients' l...

Budget Allocation Myopia and Prioritizing Your Expenditures

›
Top management's empowerment - the dream of every CSO, or IT manager responsible for allocating the infosec budget, and requesting futur...
Thursday, July 20, 2006

Open Source North Korean IMINT Reloaded

›
Continuing the latest coverage on North Korea , and the Travel Without Moving series , yesterday I came across to an ongoing initiative on...
Monday, July 17, 2006

Malware Search Engine

›
While it seems that it takes a publicly traded Internet filtering company to come up with quite some creativity, it's always coming bac...
Sunday, July 16, 2006

Weaponizing Space and the Emerging Space Warfare Arms Race

›
Satellites Jamming, Hijacking, Space SIGINT, Space Kill Vehicles are just the tip of the iceberg in the ongoing weaponization of Space. In p...

Scientifically Predicting Software Vulnerabilities

›
I recently came across to a research on " Modeling the Vulnerability Discovery Process " discussing : " A few models for the ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.