Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, September 27, 2006

Afterlife Data Privacy

›
Have you ever asked yourself what's going to happen with your digital data in case the worst happens, or most importantly, the pros and ...

Media Censorship in China - FAQ

›
Controversial to the generally accepted perspective that China's Internet censorship efforts are primarily a technological solution on...
Monday, September 25, 2006

Terrorism and Response 1990-2005

›
Very informative and objective retrospective on the response to terrorism from 1990 to 2005. The syllabus by Bruce D. Larkin and Ben Lozano...

Able Danger's Intelligence Unit Findings Rejected

›
The much hyped Able Danger Intelligence unit which has supposedly collected and identified information on the 9/11 terrorist attacks claim...

HP's Surveillance Methods

›
Seems like it's not just Board of Directors' Phone Records that were obtained by HP under the excuse of enforcing an exemplary corp...
Friday, September 22, 2006

Hezbollah's DNS Service Providers from 1998 to 2006

›
Nice visual representation trying to emphasize on the U.S hosting companies connection : " In the following, we examine the Hizballah ...

Interesting Anti-Phishing Projects

›
Seven anti-phishing projects , I especially find the browser recon and countermeasures one as a trendy concept, as phishers are already taki...

Airport Security Flash Game

›
Ever wanted to snoop through the luggage of others in exactly the same fashion yours gets searched through? Try this game , and make sure yo...

Soviet Propaganda Posters During the Cold War

›
Posters are a simple, yet influential form of PSYOPS , and their type of one-to-many communication method successfully achieves a decent vir...
Tuesday, September 19, 2006

Banking Trojan Defeating Virtual Keyboards

›
The folks behind VirusTotal , just released an analysis and an associated video of trojan generating video sessions of the infected end u...
Monday, September 18, 2006

Results of the Cyber Storm Exercise

›
The Cyber Storm exercise conducted in January " simulated a sophisticated cyber attack campaign through a series of scenarios directe...

Examining Internet Privacy Policies

›
Accountability, public commitment, or copywriters charging per word, privacy policies are often taken for fully enforced ones, whereas the t...

Cyber Intelligence - CYBERINT

›
HUMINT , SIGINT , TECHINT , all concepts for gathering intelligence and supporting decision makers on emerging trends are invaluable by thei...

Leaked Unmanned Aerial Vehicle Photo of Taliban Militants

›
Missed shot from a predator drone due to moral concerns, remarkable move and one visionary enought not to provoke another media fiasco of ki...
Thursday, September 14, 2006

Internet PSYOPS - Psychological Operations

›
Psychological operations or PSYOPS is an indirect use of information warfare methods to deceive, shape and influence the behavior and att...
Wednesday, September 13, 2006

Prosecuting Defectors and Appointing Insiders

›
In the year 2006, those who control Russia's energy reserves control a huge portion of the world's energy market -- renewable energy...

Malware on Diebold Voting Machines

›
Continuing the previous post on " How to Win the U.S Elections " seems like malware is indeed diebold voting machines compatible ...

Vulnerabilities in Emergency SMS Broadcasting

›
There's been a recent test of emergency cell phone alert in the Netherlands -- original article was here -- and while broadcasting sup...

Testing Intrusion Prevention Systems

›
Informative testings results of various IPSs such as Juniper IDP 200 , Cisco IPS 4240 , eSoft ThreatWall 200 , ForeScout ActiveScout 100 ,...

Google Anti-Phishing Black and White Lists

›
Can the world's most effective search engine manage to keep questionable sites away from the search results of its users? Seems like it...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.