Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, February 01, 2007

The TalkRization of My Blog

›
The service is quite intuitive for a free one, and I must say I never actually got the time to run a podcast on my one, so TalkR seems like...

Old Media VS New Media

›
The never ending war of corporate interests between the old and the new media , seems to be re-emerging on a weekly basis. Obviously, newsp...

PR Storm

›
Great to see that Mike Rothman and Bill Brenner know how to read between the lines. Here's a related point of view on the Storm Worm -...
Friday, January 26, 2007

Clustering Phishing Attacks

›
Clustering a phishing attack to get an in-depth and complete view on the inner workings of a major phishing outbreak or a specific campaig...

Visual Thesaurus on Security

›
In case you haven't heard of the Thinkmap Visual Thesaurus , it's an " interactive dictionary and thesaurus which creates word ...
Thursday, January 25, 2007

Testing Anti Virus Software Against Packed Malware

›
Very interesting idea as packed malware is something rather common these days, and as we've seen the recent use of commercial packers i...

Threats of Using Outsourced Software

›
Self-efficiency in (quality) software programming for security reasons -- yeah, sure : " The possibility that programmers might hide T...

Who's Who on Information and Network Security in Europe

›
A very handy summary of Europe's infosec entities and contact details that come as a roadmap for possible partnerships or analyst's...

The Zero Day Vulnerabilities Cash Bubble

›
The WMF was reportedly sold for $4000 , a Vista zero day was available for sale at $50,000 , and now private vulnerability brokers claim th...
Tuesday, January 23, 2007

Attack of the SEO Bots on the .EDU Domain

›
A university's Internet presence often results in very high pageranks for their site, therefore, if a malicious spammer would like to ha...

Social Engineering and Malware

›
With all the buzz over the "Storm Worm" -- here's a frontal PR attack among vendors -- it is almost unbelievable how hungry f...
Wednesday, January 17, 2007

Collected in the Wild

›
Nothing special, looks like a downloader, tries to connect to *****.cc/getcommand.php?addtodb=1&uid=rtrtrele.CurrentU. to get the payloa...

Inside an Email Harvester's Configuration File

›
In previous posts on web application email harvesting , and the distributed email harvesting honeypot , I commented on a relatively less pop...
Monday, January 15, 2007

The Life of a Security Threat

›
Eye-catching streaming video courtesy of iDefense . In the past, iDefense got a lot of publicity due to their outstanding cyber intelligenc...
Saturday, January 13, 2007

Security Lifestyle(S)

›
If Security is a state of mind, then so is brand loyalty.
Thursday, January 11, 2007

Head Mounted Surveillance System

›
It's so cheap and affordable even you can add it to your wish list : " The new DV ProFusion is a cost effective alternative to th...

Transferring Sensitive Military Technology

›
Busted : " China on Tuesday condemned US sanctions imposed last week on three Chinese companies for allegedly selling banned weapons t...
Wednesday, January 10, 2007

It's all About the Vision and the Courage to Execute it

›
Great article on China's blogging market and the never-ending censorship saga. Meet Fang Xingdong, a banned journalist who decides to b...

Preventing a Massive al-Qaeda Cyber Attack

›
From the unpragmatic department : " Colarik proposes "a league of cyber communities." The world's 20 largest economies w...

Eyes in London's Sky - Surveillance Poster

›
Alcohol's bad, drugs are bad, surveillance is good for protecting your from the insecurities we made you become paranoid of, and so are...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.