Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, September 19, 2006

Banking Trojan Defeating Virtual Keyboards

›
The folks behind VirusTotal , just released an analysis and an associated video of trojan generating video sessions of the infected end u...
Monday, September 18, 2006

Results of the Cyber Storm Exercise

›
The Cyber Storm exercise conducted in January " simulated a sophisticated cyber attack campaign through a series of scenarios directe...

Examining Internet Privacy Policies

›
Accountability, public commitment, or copywriters charging per word, privacy policies are often taken for fully enforced ones, whereas the t...

Cyber Intelligence - CYBERINT

›
HUMINT , SIGINT , TECHINT , all concepts for gathering intelligence and supporting decision makers on emerging trends are invaluable by thei...

Leaked Unmanned Aerial Vehicle Photo of Taliban Militants

›
Missed shot from a predator drone due to moral concerns, remarkable move and one visionary enought not to provoke another media fiasco of ki...
Thursday, September 14, 2006

Internet PSYOPS - Psychological Operations

›
Psychological operations or PSYOPS is an indirect use of information warfare methods to deceive, shape and influence the behavior and att...
Wednesday, September 13, 2006

Prosecuting Defectors and Appointing Insiders

›
In the year 2006, those who control Russia's energy reserves control a huge portion of the world's energy market -- renewable energy...

Malware on Diebold Voting Machines

›
Continuing the previous post on " How to Win the U.S Elections " seems like malware is indeed diebold voting machines compatible ...

Vulnerabilities in Emergency SMS Broadcasting

›
There's been a recent test of emergency cell phone alert in the Netherlands -- original article was here -- and while broadcasting sup...

Testing Intrusion Prevention Systems

›
Informative testings results of various IPSs such as Juniper IDP 200 , Cisco IPS 4240 , eSoft ThreatWall 200 , ForeScout ActiveScout 100 ,...

Google Anti-Phishing Black and White Lists

›
Can the world's most effective search engine manage to keep questionable sites away from the search results of its users? Seems like it...
Tuesday, September 12, 2006

Visualizing Enron's Email Communications

›
In a previous post " There You Go With Your Financial Performance Transparency " I mentioned the release of Enron's email comm...
Monday, September 11, 2006

Secret CIA Prisons

›
It's official, there're indeed (publicly) secret CIA prisons , and a public commitment towards improvement : " All suspects wil...

NSA's Terrorist Records Database

›
Right on time! Inside sources -- this is a creative spoof -- at the NSA finally coordinated their intelligence sharing efforts with the Patr...

The Freedom Tower - 11th September 2006

›
That's of course how it's gonna look like in 2012 -- true leaders never look into the past, they're too busy defining the futur...
Friday, September 08, 2006

A Study on The Value of Mobile Location Privacy

›
Right in between Flickr's introduction of geotagging , the term stalkerazzi got its necessary attention, then again it entirely depends ...

Email Spam Harvesting Statistics

›
Web application email harvesting has always represented an untapped threat, and it's not the basics of parsing or web application vulne...

Benchmarking and Optimising Malware

›
With the growth and diversity of today's malware , performance criteria for a malicious code is reasonably neglected as a topic of inter...
Thursday, September 07, 2006

Google Hacking for Cryptographic Secrets

›
Interesting perspective, for sure could prove handy on a nation-wide scale . The concept of googling for private keys has been around for q...
Wednesday, September 06, 2006

Hezbollah's use of Unmanned Aerial Vehicles - UAVs

›
According to the common wisdom, terrorists -- or let's just say contradictive political fractions -- weren't supposed to be capable ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.