Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, March 01, 2007

AdSense Click Fraud Rates

›
Google's single most profitable revenue generation source AdSense has always been under fire for click fraud and most importanly the com...
Wednesday, February 28, 2007

Social Engineering the Old Media

›
While the Rules of the Thirds are partly in place, the floating fragnance and his depressed look provide some clues. The story is very inte...

Storm Worm Switching Propagation Vectors

›
The storm started with mass mailings , then the malware switched to IM propagation , and now the infected PCs are further spreading through ...
Tuesday, February 27, 2007

Credit Card Data Cloning Tactic

›
First of all, she's too cute for someone to even have the slightest suspicion, and to be honest the posers paying their coffee with a cr...

XSS Vulnerabilities in E-banking Sites

›
The other day I came across to this summary with direct examples of various XSS vulnerabilities at E-banking sites , and I wonder why the re...

Fake Terror SMS Sent to 10,000 People

›
This is serious, and while it was a hoax , it could have had much more devastating results acting as a propagation vector for malware, a phi...
Friday, February 23, 2007

A Review of SiteAdvisor Pro

›
During 2006, the company popped out like a mushroom in front of my desktop as you can read in a previous post , and on its acquisition two ...

Characteristics of Islamist Websites

›
Excellent and recent analysis of the most common characteristics of islamist websites published by the Middle East Media Research Institute...

The RootLauncher Kit

›
After providing more insights on the WebAttacker Toolkit and the Nuclear Grabber , in this post I'll discuss the RootLauncher, a releas...
Thursday, February 22, 2007

Image Blocking in Email Clients and Web Services

›
Handy graphs and best practices on the state of default remote image loading in desktop and online email clients -- a problematic issue fro...

Korean Zombies Behind the Root Servers Attack

›
More details on the recent DDoS attacks on the DNS root servers emerge, seems like the attacks originated from Sourth Korean infected PC s, ...
Wednesday, February 21, 2007

The Phishing Ecosystem

›
Phishing is the efficient case of online social engineering . With the ease of sending phishing emails thanks to malware infected PCs -- sp...
Monday, February 19, 2007

Cuba's Internet Dictatorship

›
And you thought people in China suffer from the lack of free speech expression . Here's the cheap version of the great firewall of China...
Sunday, February 18, 2007

Profiling Sergey Brin

›
Great weekend reading : " Stepping through the sliding glass door into their office is like walking into a playroom for tech-savvy adu...

Beyond Traditional Advertising Packages

›
Differentiate your value proposition or cease to exist. And hey, that's on Madison Avenue : " As a startup carrier that hadn't...

My Feed is on Fire, My Feed is on Fire!

›
I've never had so many people connected to me , perhaps it's the consequence of Feedburner detecting Google Readers as of this wee...
Friday, February 16, 2007

Delicious Information Warfare - Friday 16th

›
Here are some articles and blog posts worth reading plus the related comments. Previous summaries as well . Islamic Terrorism from Cleargu...

Terrorism and Encryption

›
Jihadist themed encryption tool -- using "infidel" algorithms : " The program`s `portability` as an application (not requirin...
Thursday, February 15, 2007

The Electronic Frontier Foundation in Europe

›
Couldn't get any better : " The Electronic Frontier Foundation (EFF) opened a new office in Brussels today to work with various in...

RFID Tracking Miniaturization

›
First it was RFID tracking ink , now with the introduction of the new generation Hitachi mu-chips, miniaturization proves for yet another ti...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.