Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, February 12, 2007

Overachieving Technology Companies

›
Great dataset by Forbes - The 25 Fastest-Growing Tech Companies : " Our selection process: We require at least $25 million in sales, 1...
Thursday, February 08, 2007

Receiving Everyone's Financial Statements

›
Bank institutions around the world - stay tuned for wannabe identity thieves requesting their statements while hoping you'll forward th...

Automated Detection for Patterns of Insecurities

›
While there're lots of pros and cons to consider when it comes to automated source code scanning, Fortify's pricey automated sou...
Tuesday, February 06, 2007

Interactivity by Default

›
Proud to be operating in a Web 2.0 world, I'm continuing to integrate features to make the reading of this blog more interactive, less t...
Friday, February 02, 2007

Attack of the Biting UAVs

›
Remotely controlled unmanned aerial vehicles have been shifting usability from defensive(reconnaissance) to offensive( weapons payload ) fo...
Thursday, February 01, 2007

The TalkRization of My Blog

›
The service is quite intuitive for a free one, and I must say I never actually got the time to run a podcast on my one, so TalkR seems like...

Old Media VS New Media

›
The never ending war of corporate interests between the old and the new media , seems to be re-emerging on a weekly basis. Obviously, newsp...

PR Storm

›
Great to see that Mike Rothman and Bill Brenner know how to read between the lines. Here's a related point of view on the Storm Worm -...
Friday, January 26, 2007

Clustering Phishing Attacks

›
Clustering a phishing attack to get an in-depth and complete view on the inner workings of a major phishing outbreak or a specific campaig...

Visual Thesaurus on Security

›
In case you haven't heard of the Thinkmap Visual Thesaurus , it's an " interactive dictionary and thesaurus which creates word ...
Thursday, January 25, 2007

Testing Anti Virus Software Against Packed Malware

›
Very interesting idea as packed malware is something rather common these days, and as we've seen the recent use of commercial packers i...

Threats of Using Outsourced Software

›
Self-efficiency in (quality) software programming for security reasons -- yeah, sure : " The possibility that programmers might hide T...

Who's Who on Information and Network Security in Europe

›
A very handy summary of Europe's infosec entities and contact details that come as a roadmap for possible partnerships or analyst's...

The Zero Day Vulnerabilities Cash Bubble

›
The WMF was reportedly sold for $4000 , a Vista zero day was available for sale at $50,000 , and now private vulnerability brokers claim th...
Tuesday, January 23, 2007

Attack of the SEO Bots on the .EDU Domain

›
A university's Internet presence often results in very high pageranks for their site, therefore, if a malicious spammer would like to ha...

Social Engineering and Malware

›
With all the buzz over the "Storm Worm" -- here's a frontal PR attack among vendors -- it is almost unbelievable how hungry f...
Wednesday, January 17, 2007

Collected in the Wild

›
Nothing special, looks like a downloader, tries to connect to *****.cc/getcommand.php?addtodb=1&uid=rtrtrele.CurrentU. to get the payloa...

Inside an Email Harvester's Configuration File

›
In previous posts on web application email harvesting , and the distributed email harvesting honeypot , I commented on a relatively less pop...
Monday, January 15, 2007

The Life of a Security Threat

›
Eye-catching streaming video courtesy of iDefense . In the past, iDefense got a lot of publicity due to their outstanding cyber intelligenc...
Saturday, January 13, 2007

Security Lifestyle(S)

›
If Security is a state of mind, then so is brand loyalty.
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.