Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, October 30, 2006

Fake Search Warrant Generator

›
In response to Christopher Soghoian's home raid -- the masked superhero by night -- a fake search warrant generator was just released...
Sunday, October 29, 2006

Greetings Professor Falken

›
The classic that originally started the war dialing generation seems to never fade, and its core idea of simulating a Global Thermonuclear ...

Face Recognition on 3G Cell Phones

›
Face recognition isn't just done at home courtesy of MyHeritage.com, but on-the-go with yet another release of face recognition authent...
Saturday, October 28, 2006

Real-Time Spam Outbreak Statistics

›
Following my previous posts on " Real-Time PC Zombie Statistics ", and " Email Spam Harvesting Statistics ", you may als...
Thursday, October 26, 2006

ShotSpotter - Gunshot Sensors Network

›
ShotSpotter is : " a network of noise sensors that identifies and pinpoints gunfire. Over the past few weeks, the technology has guide...

Ms. Dewey on Microsoft and Security

›
She sure knows " all these little ones and zeroes ", and your social security number altogether. I like the idea, reminds of the ...

What are you Looking at?

›
You piece of EyeBall surveillance camera!
Tuesday, October 24, 2006

The Surveillance System About to Get Overloaded

›
I wounder would they later on publicly announce "Hall of Fame/Shame" of the most regular drinkers, and actually use to data to fue...

China's Information Security Market

›
China's information security market is very much into the introduction stage, with perimeter based defenses acting as the main security...

Detecting Malware Time Bombs with Virtual Machines

›
Back in June, details on an event that happened during 2002 started emerging, namely UBS bank's employee use of a logic bomb on the i...
Wednesday, October 18, 2006

A Cost-Benefit Analysis of Cyber Terrorism

›
What would the ROI be for a terrorist organization wanting to take advantage of cyberterrorism , and how would they measure it? Provocative...

The Stereotyped Beauty Model

›
If women/girls didn't hate each other so much, they could rule the world. Nice ad counter-attacking the entire "chickness ad model...
Tuesday, October 17, 2006

Registered Sex Offenders on MySpace

›
Should you be filtering online predators, prosecuting them, or monitoring their activities to analyze and model the behaviour of the rest o...
Monday, October 16, 2006

CIA's In-Q-Tel Investments Portfolio

›
In a previous post " Aha, a Backdoor! " I discussed the "exemption" of publicly traded companies from reporting to the S...

Observing and Analyzing Botnets

›
Informative and rich on visual materials, research presenting a " A Multifaceted Approach to Understanding the Botnet Phenomenon "...
Sunday, October 15, 2006

North Korea's Wake-up Call

›
"Hey Dick, do you know what time it is? It's Time to Bomb Kim Jong! "
Saturday, October 14, 2006

Hunting the Hacker - Documentary

›
Here's a recently released documentary -- in Russian -- entitled " Охота на хакера ", or Hunting the Hacker, discussing IT sec...
Thursday, October 12, 2006

The Return on Investment of Blogging

›
What's the return on investment (ROI) of blogging? Blogging for dollars is happening already, whereas this great post by Charlene Li e...

North Korea's Nuclear Testing Roundup

›
Way too much is happening right now, so here's are some of the articles, imagery and comments that made me an impression recently. Go th...

The History and Future of U.S. Military Satellite Communication Systems

›
Resourceful and visually rich retrospective on the developments related to the U.S. Military Satellite Communication Systems : " Satel...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.