Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, September 07, 2006

Google Hacking for Cryptographic Secrets

›
Interesting perspective, for sure could prove handy on a nation-wide scale . The concept of googling for private keys has been around for q...
Wednesday, September 06, 2006

Hezbollah's use of Unmanned Aerial Vehicles - UAVs

›
According to the common wisdom, terrorists -- or let's just say contradictive political fractions -- weren't supposed to be capable ...

HP Spying on Board of Directors' Phone Records

›
Whether a healthy paranoia , or a series of detailed leaks to the press on HP's future long term strategy, it prompted HP's chair wo...
Tuesday, September 05, 2006

Benefits of Open Source Intelligence - OSINT

›
Surprisingly, Forbes, the homepage for the world's business leaders -- and wannabe ones -- has a well written article on Open Source Int...
Monday, September 04, 2006

Stealth Satellites Developments Source Book

›
You can't hijack, intercept or hide from what you don't see or don't know it's there, and stealthy satellites are going to ...

Zero Day Initiative Upcoming Zero Day Vulnerabilities

›
Details on a dozen of " upcoming zero day vulnerabilities " are emerging from TippingPoint's Zero Day Initiative : " Ove...
Sunday, September 03, 2006

Chinese Hackers Attacking U.S Department of Defense Networks

›
This may prove to be an informative forum , and I feel that the quality of the questions and the discussion faciliator's insights in the...
Saturday, September 02, 2006

The Biggest Military Hacks of All Time

›
The biggest military hack of all time, the Pentagon hacker , the NASA hacker - hold your breath, it's another media hype or traffic ac...

The Walls and Lamps are Listening

›
And so are the hardware implanted "covert operatives".
Monday, August 28, 2006

Cyber War Strategies and Tactics

›
Starting from the basic premise that " All warfare is based on deception ", the Cyberspace offers an unprecedented amount of asymm...
Sunday, August 27, 2006

Bed Time Reading - Spying on the Bomb

›
Continuing the Bed Time Reading series , and a previous post related to India's Espionage Leaks , this book is a great retrospective on ...
Saturday, August 26, 2006

Steganography and Cyber Terrorism Communications

›
Following my previous post on Cyber Terrorism Communications and Propaganda , I'm continuing to summarize interesting findings on the to...

Microsoft's OneCare Penetration Pricing Strategy

›
In a previous post, Microsoft in the Information Security Market , I commented on Microsoft's most recent move into the information secu...

Futuristic Warfare Technologies

›
The future of warfare will definitely have to do with technologies and convergence, at least the near one. Some logical developments such as...

Face Recognition At Home

›
In a previous post, Biased Privacy Violation I mentioned two web sites, DontDateHimGirl.com , DontDateHerMan.com and the associated privac...
Tuesday, August 22, 2006

Cyber Terrorism Communications and Propaganda

›
Further expanding the previous discussion on Tracking Down Internet Terrorist Propaganda , and patterns of Arabic Extremist Group Forum Mess...

Virus Outbreak Response Time

›
In a previous posts I discussed various trends related to malware families , and mentioned CipherTrust's Real Time PC Zombie Statistics...

U.S Air Force on MySpace

›
Seems like the U.S Air Force is joining MySpace : " The Air Force profile will show users five video clips that the Recruiting Service ...
Sunday, August 20, 2006

North Korea's Strategic Developments and Financial Operations

›
Catching up with the latest developments at the hottest -- at least from a national security point of view -- zone in Asia. North Korea seem...
Saturday, August 19, 2006

On the Insecurities of Sun Tanning

›
You definitely don't need a CISSP certificate to blog on this one, just make sure you don't forget that there should be a limit on e...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.