Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Saturday, January 13, 2007

Security Lifestyle(S)

›
If Security is a state of mind, then so is brand loyalty.
Thursday, January 11, 2007

Head Mounted Surveillance System

›
It's so cheap and affordable even you can add it to your wish list : " The new DV ProFusion is a cost effective alternative to th...

Transferring Sensitive Military Technology

›
Busted : " China on Tuesday condemned US sanctions imposed last week on three Chinese companies for allegedly selling banned weapons t...
Wednesday, January 10, 2007

It's all About the Vision and the Courage to Execute it

›
Great article on China's blogging market and the never-ending censorship saga. Meet Fang Xingdong, a banned journalist who decides to b...

Preventing a Massive al-Qaeda Cyber Attack

›
From the unpragmatic department : " Colarik proposes "a league of cyber communities." The world's 20 largest economies w...

Eyes in London's Sky - Surveillance Poster

›
Alcohol's bad, drugs are bad, surveillance is good for protecting your from the insecurities we made you become paranoid of, and so are...
Tuesday, January 09, 2007

Still Living in the Perimeter Defense World

›
Whereas you'd better break out of the budget-allocation myopia and consider prioritizing your security investments , decreased spending...

Data Mining Credit Cards for Child Porn Purchases

›
22 million customers had the privacy of their credit card purchasing histories breached for the sake of coming up with 322 suspects while l...

Insider Sentiments around L.A's Traffic Light System

›
Rember how the Hollywood Hackers were winning time while heading straight to Grand Central Station in NYC to outsmart the Plague's plan...
Monday, January 08, 2007

Iran Bans Purchase of Foreign Satellite Data

›
Re-inventing the wheel : " According to the bill, a copy of which has been sent to all ministries, organizations, state and revolution...

Russia's Lawful Interception of Internet Communications

›
Don't fool yourself, they've been doing it for the time being, now they're legalizing it -- working for anything like the EFF i...
Sunday, January 07, 2007

Visits to the White House Now Top Secret Information

›
Informative - White House visitor logs declared top secret : " The five-page document dated May 17 declares that all entry and exit da...

Sunday's Portion of Hahaha

›
While patiently waiting for the future adventures of Monica Furious , I came across a nice collection of cartoons . I'm sure you'll ...

Web Economy Buzz Words Generator

›
Whether looking for VC cash, or having a quota to meet being a salesman, some of these may come handy or pretty much make someone's mor...

Four Years of Application Pen Testing Statistics

›
Invaluable : " The article presents a unique opportunity to take a peek into the usually secluded data regarding the actual risk posed...

Foreign Intelligence Services and U.S Technology Espionage

›
Talking about globalization, like it or not, perceive it as a threat to national security or a key economic benefit, it's happening and ...
Thursday, January 04, 2007

Technical Analysis of the Skype Trojan

›
During December yet another trojan started making rounds, this time dubbed the Skype trojan -- SEO conspiracy. Was the trojan exploiting a ...

Were you Tracking Santa's Location?

›
As usual, NORAD were , but there's one minor issue to keep in mind and that's how during the Christmas and New Year holidays Santa C...
Tuesday, December 19, 2006

Phishing Domains Hosting Multiple Phishing Sites

›
Well, well, well. What do we got here? Couple of interesting domains hosting phishing sites of multiple banks for you to take a look at, or ...

Google and Yahoo's Shareholders Against Censorship

›
Collective bargaining tends to achieve the necessary echo effect : " The New York City Pension Fund wants shareholders to force Google...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.