Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, September 13, 2006

Prosecuting Defectors and Appointing Insiders

›
In the year 2006, those who control Russia's energy reserves control a huge portion of the world's energy market -- renewable energy...

Malware on Diebold Voting Machines

›
Continuing the previous post on " How to Win the U.S Elections " seems like malware is indeed diebold voting machines compatible ...

Vulnerabilities in Emergency SMS Broadcasting

›
There's been a recent test of emergency cell phone alert in the Netherlands -- original article was here -- and while broadcasting sup...

Testing Intrusion Prevention Systems

›
Informative testings results of various IPSs such as Juniper IDP 200 , Cisco IPS 4240 , eSoft ThreatWall 200 , ForeScout ActiveScout 100 ,...

Google Anti-Phishing Black and White Lists

›
Can the world's most effective search engine manage to keep questionable sites away from the search results of its users? Seems like it...
Tuesday, September 12, 2006

Visualizing Enron's Email Communications

›
In a previous post " There You Go With Your Financial Performance Transparency " I mentioned the release of Enron's email comm...
Monday, September 11, 2006

Secret CIA Prisons

›
It's official, there're indeed (publicly) secret CIA prisons , and a public commitment towards improvement : " All suspects wil...

NSA's Terrorist Records Database

›
Right on time! Inside sources -- this is a creative spoof -- at the NSA finally coordinated their intelligence sharing efforts with the Patr...

The Freedom Tower - 11th September 2006

›
That's of course how it's gonna look like in 2012 -- true leaders never look into the past, they're too busy defining the futur...
Friday, September 08, 2006

A Study on The Value of Mobile Location Privacy

›
Right in between Flickr's introduction of geotagging , the term stalkerazzi got its necessary attention, then again it entirely depends ...

Email Spam Harvesting Statistics

›
Web application email harvesting has always represented an untapped threat, and it's not the basics of parsing or web application vulne...

Benchmarking and Optimising Malware

›
With the growth and diversity of today's malware , performance criteria for a malicious code is reasonably neglected as a topic of inter...
Thursday, September 07, 2006

Google Hacking for Cryptographic Secrets

›
Interesting perspective, for sure could prove handy on a nation-wide scale . The concept of googling for private keys has been around for q...
Wednesday, September 06, 2006

Hezbollah's use of Unmanned Aerial Vehicles - UAVs

›
According to the common wisdom, terrorists -- or let's just say contradictive political fractions -- weren't supposed to be capable ...

HP Spying on Board of Directors' Phone Records

›
Whether a healthy paranoia , or a series of detailed leaks to the press on HP's future long term strategy, it prompted HP's chair wo...
Tuesday, September 05, 2006

Benefits of Open Source Intelligence - OSINT

›
Surprisingly, Forbes, the homepage for the world's business leaders -- and wannabe ones -- has a well written article on Open Source Int...
Monday, September 04, 2006

Stealth Satellites Developments Source Book

›
You can't hijack, intercept or hide from what you don't see or don't know it's there, and stealthy satellites are going to ...

Zero Day Initiative Upcoming Zero Day Vulnerabilities

›
Details on a dozen of " upcoming zero day vulnerabilities " are emerging from TippingPoint's Zero Day Initiative : " Ove...
Sunday, September 03, 2006

Chinese Hackers Attacking U.S Department of Defense Networks

›
This may prove to be an informative forum , and I feel that the quality of the questions and the discussion faciliator's insights in the...
Saturday, September 02, 2006

The Biggest Military Hacks of All Time

›
The biggest military hack of all time, the Pentagon hacker , the NASA hacker - hold your breath, it's another media hype or traffic ac...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.