Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, March 09, 2007

Envy These Women Please

›
Differentiating from the usual Most Powerful Women list, Forbes did a little niching to come up with a slideshow of women billionaires they...

U.K's Latest Military Satellite System

›
The U.K military is about to upgrade their Skynet 4 satellite system to Skynet 5 : " Four steerable antennas give it the ability to fo...

Armed Land Robots

›
After seeking to dominate the air , it's time defense contractors turn back to innovating on the ground, especially when we speak of arm...
Thursday, March 08, 2007

UK Telecoms Lack of Web Site Privacy

›
When the U.S and Canada are the benchmark it's logical to conclude the U.K gets poor ratings as web site privacy especially in the comme...

Steganography Applications Hash Set

›
Did you know that there are over 600 applications capable of using steganography to hide data ? Me neither, but here's a company that...

Distributed Computing with Malware

›
Distributed computing with malware infected PCs is nothing new as a concept, it's just the lack of botnet master's desire to contri...
Wednesday, March 07, 2007

Documentary on ECHELON - The Spy System

›
Remember ECHELON ? The über-secretive worldwide intelligence sharing network that various activists once tried to poison by generating fake ...

USB Surveillance Sticks

›
Despite the ongoing awareness built among enterprises and end users on the risks posed by removable media, there are vendors offering variou...

Death is Just an Upgrade

›
Started as a project to digitally mimic 100% a human's behaviour, the Virtual Soldier research program is getting more funding to accom...

Botnet Communication Platforms

›
Botnets, or the automated exploitation and management of malware infected PCs is perhaps the most popular and efficient cyber threat the Int...
Friday, March 02, 2007

Real Time Censored URL Check in China

›
While the original initiative for a real-time URL censorship check in China was originally realized as a project by Jonathan Zittrain and B...
Thursday, March 01, 2007

AdSense Click Fraud Rates

›
Google's single most profitable revenue generation source AdSense has always been under fire for click fraud and most importanly the com...
Wednesday, February 28, 2007

Social Engineering the Old Media

›
While the Rules of the Thirds are partly in place, the floating fragnance and his depressed look provide some clues. The story is very inte...

Storm Worm Switching Propagation Vectors

›
The storm started with mass mailings , then the malware switched to IM propagation , and now the infected PCs are further spreading through ...
Tuesday, February 27, 2007

Credit Card Data Cloning Tactic

›
First of all, she's too cute for someone to even have the slightest suspicion, and to be honest the posers paying their coffee with a cr...

XSS Vulnerabilities in E-banking Sites

›
The other day I came across to this summary with direct examples of various XSS vulnerabilities at E-banking sites , and I wonder why the re...

Fake Terror SMS Sent to 10,000 People

›
This is serious, and while it was a hoax , it could have had much more devastating results acting as a propagation vector for malware, a phi...
Friday, February 23, 2007

A Review of SiteAdvisor Pro

›
During 2006, the company popped out like a mushroom in front of my desktop as you can read in a previous post , and on its acquisition two ...

Characteristics of Islamist Websites

›
Excellent and recent analysis of the most common characteristics of islamist websites published by the Middle East Media Research Institute...

The RootLauncher Kit

›
After providing more insights on the WebAttacker Toolkit and the Nuclear Grabber , in this post I'll discuss the RootLauncher, a releas...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.