Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, November 13, 2006

Jihadi PSYOPS - CIA Attacks on Terrorist Websites

›
Last week, the Internet Haganah reported on rumors around jihadist forums, namely, that the CIA has been attacking jihadi web sites . Now w...

Bill Gates on Traffic Acquisition and Internet Bubbles

›
Confused Bill Gates , but a regularly attacked one too. A rather predictable comment given he's not the only one selling the chewing gum...
Thursday, November 09, 2006

The Nuclear Grabber Toolkit

›
In case you're unaware of Nuclear Grabber's existence -- Babelfish it --WebSense commented on it in their latest " Security T...

All Your Electromagnetic Transmissions Are Belong To Us

›
This is worth mentioning , as while you try not to talk about these locations for as long as someone doesn't start blowing the whistle ...
Tuesday, November 07, 2006

The Blogosphere and Splogs

›
Just read Technorati's latest " State of the Blogosphere, October, 2006 " presented with in-depth visual stats on the 57 milli...
Friday, November 03, 2006

Delicious Information Warfare - Friday

›
Wish I could blog everything I read and makes me an impression but that's not the point. The point is to emphasize on the big picture, ...
Wednesday, November 01, 2006

FAS's Immune Attack Game

›
Professor Falken would have loved this one. The Federation of American Scientists recently released their report from the Summit on Educat...

Proof of Concept Symbian Malware Courtesy of the Academic World

›
Know your enemy to better predict his moves and future strategies as Symbian malware optimization is getting the necessary attention from ...
Monday, October 30, 2006

Fake Search Warrant Generator

›
In response to Christopher Soghoian's home raid -- the masked superhero by night -- a fake search warrant generator was just released...
Sunday, October 29, 2006

Greetings Professor Falken

›
The classic that originally started the war dialing generation seems to never fade, and its core idea of simulating a Global Thermonuclear ...

Face Recognition on 3G Cell Phones

›
Face recognition isn't just done at home courtesy of MyHeritage.com, but on-the-go with yet another release of face recognition authent...
Saturday, October 28, 2006

Real-Time Spam Outbreak Statistics

›
Following my previous posts on " Real-Time PC Zombie Statistics ", and " Email Spam Harvesting Statistics ", you may als...
Thursday, October 26, 2006

ShotSpotter - Gunshot Sensors Network

›
ShotSpotter is : " a network of noise sensors that identifies and pinpoints gunfire. Over the past few weeks, the technology has guide...

Ms. Dewey on Microsoft and Security

›
She sure knows " all these little ones and zeroes ", and your social security number altogether. I like the idea, reminds of the ...

What are you Looking at?

›
You piece of EyeBall surveillance camera!
Tuesday, October 24, 2006

The Surveillance System About to Get Overloaded

›
I wounder would they later on publicly announce "Hall of Fame/Shame" of the most regular drinkers, and actually use to data to fue...

China's Information Security Market

›
China's information security market is very much into the introduction stage, with perimeter based defenses acting as the main security...

Detecting Malware Time Bombs with Virtual Machines

›
Back in June, details on an event that happened during 2002 started emerging, namely UBS bank's employee use of a logic bomb on the i...
Wednesday, October 18, 2006

A Cost-Benefit Analysis of Cyber Terrorism

›
What would the ROI be for a terrorist organization wanting to take advantage of cyberterrorism , and how would they measure it? Provocative...

The Stereotyped Beauty Model

›
If women/girls didn't hate each other so much, they could rule the world. Nice ad counter-attacking the entire "chickness ad model...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.