Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, August 27, 2006

Bed Time Reading - Spying on the Bomb

›
Continuing the Bed Time Reading series , and a previous post related to India's Espionage Leaks , this book is a great retrospective on ...
Saturday, August 26, 2006

Steganography and Cyber Terrorism Communications

›
Following my previous post on Cyber Terrorism Communications and Propaganda , I'm continuing to summarize interesting findings on the to...

Microsoft's OneCare Penetration Pricing Strategy

›
In a previous post, Microsoft in the Information Security Market , I commented on Microsoft's most recent move into the information secu...

Futuristic Warfare Technologies

›
The future of warfare will definitely have to do with technologies and convergence, at least the near one. Some logical developments such as...

Face Recognition At Home

›
In a previous post, Biased Privacy Violation I mentioned two web sites, DontDateHimGirl.com , DontDateHerMan.com and the associated privac...
Tuesday, August 22, 2006

Cyber Terrorism Communications and Propaganda

›
Further expanding the previous discussion on Tracking Down Internet Terrorist Propaganda , and patterns of Arabic Extremist Group Forum Mess...

Virus Outbreak Response Time

›
In a previous posts I discussed various trends related to malware families , and mentioned CipherTrust's Real Time PC Zombie Statistics...

U.S Air Force on MySpace

›
Seems like the U.S Air Force is joining MySpace : " The Air Force profile will show users five video clips that the Recruiting Service ...
Sunday, August 20, 2006

North Korea's Strategic Developments and Financial Operations

›
Catching up with the latest developments at the hottest -- at least from a national security point of view -- zone in Asia. North Korea seem...
Saturday, August 19, 2006

On the Insecurities of Sun Tanning

›
You definitely don't need a CISSP certificate to blog on this one, just make sure you don't forget that there should be a limit on e...
Wednesday, August 16, 2006

AOL's Search Queries Data Mined

›
While one of AOL's searchers was publicly identified , enthusiasts are tweaking , and randomly scrolling the then leaked, now publicly ...
Saturday, August 12, 2006

Bed Time Reading - Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture

›
Prr, did I hear someone start counting mobile malware samples, prr? Try getting to know the OS itself, the main proof of concept faciliator ...

Anti Satellite Weapons

›
Continuing the discussion on the ongoing weaponization of space, and the consequently emerging space warfare arms race. Micro satellites dir...
Friday, August 11, 2006

China's Internet Censorship Report 2006

›
Censorship is as bad, as looking directly into the sun which causes blindness , and still remains the among the few key prerequisites for su...
Thursday, August 10, 2006

Malware Statistics on Social Networking Sites

›
Huge traffic aggregators such as the majority of social networking sites,attract not only huge percentage of the Internet's population o...

Analyzing the Intelligence Analysts' Factors of Productivity

›
Outstanding perspective, given the author is an ex-CIA analyst himself. Controversial to the common wisdom of a Project Manhattan type of de...

AOL's Search Leak User 4417749 Identified

›
A Chief Privacy Officer and basic common sense anyone? As you all know, during the weekend 20M search queries of 650,000 AOL users leaked , ...
Wednesday, August 09, 2006

Big Momma Knows Best

›
Wish it was the Chinese equivalent of Big Brother I'm refering to, in this case it's a mother of six tracking down teenagers who to...

JitterBugs - Covert Keyboard Communication Channels

›
WarTyping , keyboard acoustic emanations , and here comes a full-scale covert espionage tool recently discussed in an in-depth research at t...
Monday, August 07, 2006

Malware Bot Families, Technology and Trends

›
In case you want to know more about the evolution of bots, and ease of assembling a botnet, why families take the largest zombie share compa...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.