Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, March 12, 2007

Timeline of Iran's Nuclear Program

›
Iran's a rising star these days. It's not just that the country recently launched it's first missile into space despite efforts...

Google Maps and Privacy

›
I thought I've seen the best close-ups from Google Maps in the top 10 naked people on Google Earth , but this screenshot is spooky as t...

Touching the Future of Productivity

›
Visualization in military brienfings and intelligence gathering has been a daily lifestyle of analysts for years, but combining visualizati...
Sunday, March 11, 2007

Ballistic Missile Defense Engagement Points

›
Outstanding animation covering pretty much all of the current engagement points in case a missile is fired from anywhere across the world, t...
Saturday, March 10, 2007

Vladuz's Ebay CAPTCHA Populator

›
Nice slideshow courtesy of eWeek providing various screenshots related to Vladuz's impersonation attacks on Ebay : " And whether o...

Photoshoping Your Reality

›
It's not just a stereotyped beauty model , advanced image editing tools and techniques can make you believe in, but they can also influe...

Shots from the Malicious Wild West - Sample Three

›
Keyloggers on demand, the so called zero day keyloggers ones created especially to be used in targeted attacks are something rather common t...

Shots from the Malicious Wild West - Sample Two

›
Packers are logically capable of rebooting the lifecycle of a binary and making it truly unrecognizable. The Pohernah Crypter is among the ...

Shots from the Malicious Wild West - Sample One

›
Come to daddy. At _ http://www.ms-counter.com we have an URL spreading malware through redirectors and the natural javascript obfuscation :...
Friday, March 09, 2007

Envy These Women Please

›
Differentiating from the usual Most Powerful Women list, Forbes did a little niching to come up with a slideshow of women billionaires they...

U.K's Latest Military Satellite System

›
The U.K military is about to upgrade their Skynet 4 satellite system to Skynet 5 : " Four steerable antennas give it the ability to fo...

Armed Land Robots

›
After seeking to dominate the air , it's time defense contractors turn back to innovating on the ground, especially when we speak of arm...
Thursday, March 08, 2007

UK Telecoms Lack of Web Site Privacy

›
When the U.S and Canada are the benchmark it's logical to conclude the U.K gets poor ratings as web site privacy especially in the comme...

Steganography Applications Hash Set

›
Did you know that there are over 600 applications capable of using steganography to hide data ? Me neither, but here's a company that...

Distributed Computing with Malware

›
Distributed computing with malware infected PCs is nothing new as a concept, it's just the lack of botnet master's desire to contri...
Wednesday, March 07, 2007

Documentary on ECHELON - The Spy System

›
Remember ECHELON ? The über-secretive worldwide intelligence sharing network that various activists once tried to poison by generating fake ...

USB Surveillance Sticks

›
Despite the ongoing awareness built among enterprises and end users on the risks posed by removable media, there are vendors offering variou...

Death is Just an Upgrade

›
Started as a project to digitally mimic 100% a human's behaviour, the Virtual Soldier research program is getting more funding to accom...

Botnet Communication Platforms

›
Botnets, or the automated exploitation and management of malware infected PCs is perhaps the most popular and efficient cyber threat the Int...
Friday, March 02, 2007

Real Time Censored URL Check in China

›
While the original initiative for a real-time URL censorship check in China was originally realized as a project by Jonathan Zittrain and B...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.