Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, February 13, 2007

Emerging DDoS Attack Trends

›
In a previous post I emphasized on the long-term trend of how DoS attacks have the potential to cause as much damage as a full-scale DDoS a...

Gender Based Censorship in the News Media

›
Great perspective . The author Dr. Agnes Callamard even got the data to prove it. Limiting the freedom of expression for the sake of securin...

Forensic Examination of Terrorists' Hard Drives

›
During the last year I presented my point of view on the topic in numerous posts, in order to debunk the common misunderstanding of Cyber...
Monday, February 12, 2007

Overachieving Technology Companies

›
Great dataset by Forbes - The 25 Fastest-Growing Tech Companies : " Our selection process: We require at least $25 million in sales, 1...
Thursday, February 08, 2007

Receiving Everyone's Financial Statements

›
Bank institutions around the world - stay tuned for wannabe identity thieves requesting their statements while hoping you'll forward th...

Automated Detection for Patterns of Insecurities

›
While there're lots of pros and cons to consider when it comes to automated source code scanning, Fortify's pricey automated sou...
Tuesday, February 06, 2007

Interactivity by Default

›
Proud to be operating in a Web 2.0 world, I'm continuing to integrate features to make the reading of this blog more interactive, less t...
Friday, February 02, 2007

Attack of the Biting UAVs

›
Remotely controlled unmanned aerial vehicles have been shifting usability from defensive(reconnaissance) to offensive( weapons payload ) fo...
Thursday, February 01, 2007

The TalkRization of My Blog

›
The service is quite intuitive for a free one, and I must say I never actually got the time to run a podcast on my one, so TalkR seems like...

Old Media VS New Media

›
The never ending war of corporate interests between the old and the new media , seems to be re-emerging on a weekly basis. Obviously, newsp...

PR Storm

›
Great to see that Mike Rothman and Bill Brenner know how to read between the lines. Here's a related point of view on the Storm Worm -...
Friday, January 26, 2007

Clustering Phishing Attacks

›
Clustering a phishing attack to get an in-depth and complete view on the inner workings of a major phishing outbreak or a specific campaig...

Visual Thesaurus on Security

›
In case you haven't heard of the Thinkmap Visual Thesaurus , it's an " interactive dictionary and thesaurus which creates word ...
Thursday, January 25, 2007

Testing Anti Virus Software Against Packed Malware

›
Very interesting idea as packed malware is something rather common these days, and as we've seen the recent use of commercial packers i...

Threats of Using Outsourced Software

›
Self-efficiency in (quality) software programming for security reasons -- yeah, sure : " The possibility that programmers might hide T...

Who's Who on Information and Network Security in Europe

›
A very handy summary of Europe's infosec entities and contact details that come as a roadmap for possible partnerships or analyst's...

The Zero Day Vulnerabilities Cash Bubble

›
The WMF was reportedly sold for $4000 , a Vista zero day was available for sale at $50,000 , and now private vulnerability brokers claim th...
Tuesday, January 23, 2007

Attack of the SEO Bots on the .EDU Domain

›
A university's Internet presence often results in very high pageranks for their site, therefore, if a malicious spammer would like to ha...

Social Engineering and Malware

›
With all the buzz over the "Storm Worm" -- here's a frontal PR attack among vendors -- it is almost unbelievable how hungry f...
Wednesday, January 17, 2007

Collected in the Wild

›
Nothing special, looks like a downloader, tries to connect to *****.cc/getcommand.php?addtodb=1&uid=rtrtrele.CurrentU. to get the payloa...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.