Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, August 11, 2006

China's Internet Censorship Report 2006

›
Censorship is as bad, as looking directly into the sun which causes blindness , and still remains the among the few key prerequisites for su...
Thursday, August 10, 2006

Malware Statistics on Social Networking Sites

›
Huge traffic aggregators such as the majority of social networking sites,attract not only huge percentage of the Internet's population o...

Analyzing the Intelligence Analysts' Factors of Productivity

›
Outstanding perspective, given the author is an ex-CIA analyst himself. Controversial to the common wisdom of a Project Manhattan type of de...

AOL's Search Leak User 4417749 Identified

›
A Chief Privacy Officer and basic common sense anyone? As you all know, during the weekend 20M search queries of 650,000 AOL users leaked , ...
Wednesday, August 09, 2006

Big Momma Knows Best

›
Wish it was the Chinese equivalent of Big Brother I'm refering to, in this case it's a mother of six tracking down teenagers who to...

JitterBugs - Covert Keyboard Communication Channels

›
WarTyping , keyboard acoustic emanations , and here comes a full-scale covert espionage tool recently discussed in an in-depth research at t...
Monday, August 07, 2006

Malware Bot Families, Technology and Trends

›
In case you want to know more about the evolution of bots, and ease of assembling a botnet, why families take the largest zombie share compa...
Sunday, August 06, 2006

DVD of the Weekend - The Final Cut

›
This weekend's featured DVD is a marvelous representation of a full-scale 1984 type of mass surveillance society, but compared to an ut...
Saturday, August 05, 2006

Future in Malicious Code 2006

›
What's new on the malware front ? Quite some new developments to be included in Q2's summary for 2006, I'm about to finalize an...
Friday, August 04, 2006

Mobile Devices Hacking Through a Suitcase

›
Define:nerd " Luca Carettoni and Claudio Merloni are security consultants at Milan, Italy-based Secure Network. The two created the Bl...
Thursday, August 03, 2006

Achieving Information Warfare Dominance Back in 1962

›
The point here isn't the consolidation indicated in the article : " The consolidation involves Singer’s headquarters staff, and su...

One Time Password Generating Credit Card

›
This is cute as it solves a major problem with customers having to use, and more easily lose tokens. Neat integration with the push of a but...
Wednesday, August 02, 2006

But Of Course It's a Pleasant Transaction

›
Great example of automated bots attacking Ebay's core trust establishing process - the feedbacks provided by users taking advantage of t...
Monday, July 31, 2006

Things Money Cannot Buy

›
1. Love with tingles 2. True Friends 3. Respect , one when the results go beyond the position and size of market capitalization 4. Style 5....

Japan's Reliance on U.S Spy Satellites and Early Warning Missile Systems

›
With China breathing down Japan's neck, and North Korea crying for attention by actively experimenting with symmetric and asymmetric wa...
Sunday, July 30, 2006

DVD of the Weekend - Path to War

›
As I've been busy catching up with way too many things to list them, I'd better finalize my creativity efforts and provide you with ...
Thursday, July 27, 2006

The Beauty of the Surrealistic Spam Art

›
Given the volume of spam representing over 50% of the world's email traffic, obviously to some it represents a huge sample to draw sadne...
Wednesday, July 26, 2006

Splitting a Botnet's Bandwidth Capacity

›
Metaphorically speaking, I always say that the masssess of end users' bandwidth is reaching that of a mid size ISP, while the lack of in...
Tuesday, July 25, 2006

Latest Report on Click Fraud

›
Google does have countless features, and it's not even considering to stop rolling new ones, but the secret to its huge market capitaliz...
Monday, July 24, 2006

An Intergalactic Security Statement

›
Hell of a comment on the Malware Search Engine . Hackers crack secret Google malware search codes : " Hidden malware search capabiliti...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.