Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, February 16, 2007

Delicious Information Warfare - Friday 16th

›
Here are some articles and blog posts worth reading plus the related comments. Previous summaries as well . Islamic Terrorism from Cleargu...

Terrorism and Encryption

›
Jihadist themed encryption tool -- using "infidel" algorithms : " The program`s `portability` as an application (not requirin...
Thursday, February 15, 2007

The Electronic Frontier Foundation in Europe

›
Couldn't get any better : " The Electronic Frontier Foundation (EFF) opened a new office in Brussels today to work with various in...

RFID Tracking Miniaturization

›
First it was RFID tracking ink , now with the introduction of the new generation Hitachi mu-chips, miniaturization proves for yet another ti...
Wednesday, February 14, 2007

Censorship in China - An Open Letter

›
An open letter to Google's Founders regarding the censorship of search results in China : " During the National Day holiday week i...

She Loves Me, She Loves Me Not

›
I'm in love, with myself at the first place, and while Saint Valentine's meant to reboot a relationship so to speak, every day shoul...
Tuesday, February 13, 2007

Emerging DDoS Attack Trends

›
In a previous post I emphasized on the long-term trend of how DoS attacks have the potential to cause as much damage as a full-scale DDoS a...

Gender Based Censorship in the News Media

›
Great perspective . The author Dr. Agnes Callamard even got the data to prove it. Limiting the freedom of expression for the sake of securin...

Forensic Examination of Terrorists' Hard Drives

›
During the last year I presented my point of view on the topic in numerous posts, in order to debunk the common misunderstanding of Cyber...
Monday, February 12, 2007

Overachieving Technology Companies

›
Great dataset by Forbes - The 25 Fastest-Growing Tech Companies : " Our selection process: We require at least $25 million in sales, 1...
Thursday, February 08, 2007

Receiving Everyone's Financial Statements

›
Bank institutions around the world - stay tuned for wannabe identity thieves requesting their statements while hoping you'll forward th...

Automated Detection for Patterns of Insecurities

›
While there're lots of pros and cons to consider when it comes to automated source code scanning, Fortify's pricey automated sou...
Tuesday, February 06, 2007

Interactivity by Default

›
Proud to be operating in a Web 2.0 world, I'm continuing to integrate features to make the reading of this blog more interactive, less t...
Friday, February 02, 2007

Attack of the Biting UAVs

›
Remotely controlled unmanned aerial vehicles have been shifting usability from defensive(reconnaissance) to offensive( weapons payload ) fo...
Thursday, February 01, 2007

The TalkRization of My Blog

›
The service is quite intuitive for a free one, and I must say I never actually got the time to run a podcast on my one, so TalkR seems like...

Old Media VS New Media

›
The never ending war of corporate interests between the old and the new media , seems to be re-emerging on a weekly basis. Obviously, newsp...

PR Storm

›
Great to see that Mike Rothman and Bill Brenner know how to read between the lines. Here's a related point of view on the Storm Worm -...
Friday, January 26, 2007

Clustering Phishing Attacks

›
Clustering a phishing attack to get an in-depth and complete view on the inner workings of a major phishing outbreak or a specific campaig...

Visual Thesaurus on Security

›
In case you haven't heard of the Thinkmap Visual Thesaurus , it's an " interactive dictionary and thesaurus which creates word ...
Thursday, January 25, 2007

Testing Anti Virus Software Against Packed Malware

›
Very interesting idea as packed malware is something rather common these days, and as we've seen the recent use of commercial packers i...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.