Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, September 03, 2006

Chinese Hackers Attacking U.S Department of Defense Networks

›
This may prove to be an informative forum , and I feel that the quality of the questions and the discussion faciliator's insights in the...
Saturday, September 02, 2006

The Biggest Military Hacks of All Time

›
The biggest military hack of all time, the Pentagon hacker , the NASA hacker - hold your breath, it's another media hype or traffic ac...

The Walls and Lamps are Listening

›
And so are the hardware implanted "covert operatives".
Monday, August 28, 2006

Cyber War Strategies and Tactics

›
Starting from the basic premise that " All warfare is based on deception ", the Cyberspace offers an unprecedented amount of asymm...
Sunday, August 27, 2006

Bed Time Reading - Spying on the Bomb

›
Continuing the Bed Time Reading series , and a previous post related to India's Espionage Leaks , this book is a great retrospective on ...
Saturday, August 26, 2006

Steganography and Cyber Terrorism Communications

›
Following my previous post on Cyber Terrorism Communications and Propaganda , I'm continuing to summarize interesting findings on the to...

Microsoft's OneCare Penetration Pricing Strategy

›
In a previous post, Microsoft in the Information Security Market , I commented on Microsoft's most recent move into the information secu...

Futuristic Warfare Technologies

›
The future of warfare will definitely have to do with technologies and convergence, at least the near one. Some logical developments such as...

Face Recognition At Home

›
In a previous post, Biased Privacy Violation I mentioned two web sites, DontDateHimGirl.com , DontDateHerMan.com and the associated privac...
Tuesday, August 22, 2006

Cyber Terrorism Communications and Propaganda

›
Further expanding the previous discussion on Tracking Down Internet Terrorist Propaganda , and patterns of Arabic Extremist Group Forum Mess...

Virus Outbreak Response Time

›
In a previous posts I discussed various trends related to malware families , and mentioned CipherTrust's Real Time PC Zombie Statistics...

U.S Air Force on MySpace

›
Seems like the U.S Air Force is joining MySpace : " The Air Force profile will show users five video clips that the Recruiting Service ...
Sunday, August 20, 2006

North Korea's Strategic Developments and Financial Operations

›
Catching up with the latest developments at the hottest -- at least from a national security point of view -- zone in Asia. North Korea seem...
Saturday, August 19, 2006

On the Insecurities of Sun Tanning

›
You definitely don't need a CISSP certificate to blog on this one, just make sure you don't forget that there should be a limit on e...
Wednesday, August 16, 2006

AOL's Search Queries Data Mined

›
While one of AOL's searchers was publicly identified , enthusiasts are tweaking , and randomly scrolling the then leaked, now publicly ...
Saturday, August 12, 2006

Bed Time Reading - Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture

›
Prr, did I hear someone start counting mobile malware samples, prr? Try getting to know the OS itself, the main proof of concept faciliator ...

Anti Satellite Weapons

›
Continuing the discussion on the ongoing weaponization of space, and the consequently emerging space warfare arms race. Micro satellites dir...
Friday, August 11, 2006

China's Internet Censorship Report 2006

›
Censorship is as bad, as looking directly into the sun which causes blindness , and still remains the among the few key prerequisites for su...
Thursday, August 10, 2006

Malware Statistics on Social Networking Sites

›
Huge traffic aggregators such as the majority of social networking sites,attract not only huge percentage of the Internet's population o...

Analyzing the Intelligence Analysts' Factors of Productivity

›
Outstanding perspective, given the author is an ex-CIA analyst himself. Controversial to the common wisdom of a Project Manhattan type of de...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.