Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, March 19, 2007

The Underground Economy's Supply of Goods

›
Symantec ( SYMC ) just released their latest Internet Security Threat Report , a 104 pages of rich on graphs observations, according to the ...

Subconscious Search Monopoly Sentiments

›
And hey, that's from someone attending the Microsoft MVP for N-th time : " I was invited to attend the Microsoft MVP Summit last we...

Spam Comments Attack on TechCrunch Continuing

›
In a previous post I commented on O'Reilly.com's war on spam according to their statistics, and thought you might find the most rec...

Personal Data Security Breaches Spreadsheet

›
Some stats try to emphasize on the number of people affected while forgetting the key points I outlined in a previous post related to why ...

Complexity and Threats Mind Mapping

›
The folks at Security-Database.com -- who by the way expressed their excitement over my blog -- just released an outstanding mind mapping g...
Wednesday, March 14, 2007

Threats of Using Outsourced Software - Part Two

›
Continuing the coverage on the U.S government's overall paranoia of using outsourced software on DoD computers, even hardware -- firm...
Monday, March 12, 2007

Timeline of Iran's Nuclear Program

›
Iran's a rising star these days. It's not just that the country recently launched it's first missile into space despite efforts...

Google Maps and Privacy

›
I thought I've seen the best close-ups from Google Maps in the top 10 naked people on Google Earth , but this screenshot is spooky as t...

Touching the Future of Productivity

›
Visualization in military brienfings and intelligence gathering has been a daily lifestyle of analysts for years, but combining visualizati...
Sunday, March 11, 2007

Ballistic Missile Defense Engagement Points

›
Outstanding animation covering pretty much all of the current engagement points in case a missile is fired from anywhere across the world, t...
Saturday, March 10, 2007

Vladuz's Ebay CAPTCHA Populator

›
Nice slideshow courtesy of eWeek providing various screenshots related to Vladuz's impersonation attacks on Ebay : " And whether o...

Photoshoping Your Reality

›
It's not just a stereotyped beauty model , advanced image editing tools and techniques can make you believe in, but they can also influe...

Shots from the Malicious Wild West - Sample Three

›
Keyloggers on demand, the so called zero day keyloggers ones created especially to be used in targeted attacks are something rather common t...

Shots from the Malicious Wild West - Sample Two

›
Packers are logically capable of rebooting the lifecycle of a binary and making it truly unrecognizable. The Pohernah Crypter is among the ...

Shots from the Malicious Wild West - Sample One

›
Come to daddy. At _ http://www.ms-counter.com we have an URL spreading malware through redirectors and the natural javascript obfuscation :...
Friday, March 09, 2007

Envy These Women Please

›
Differentiating from the usual Most Powerful Women list, Forbes did a little niching to come up with a slideshow of women billionaires they...

U.K's Latest Military Satellite System

›
The U.K military is about to upgrade their Skynet 4 satellite system to Skynet 5 : " Four steerable antennas give it the ability to fo...

Armed Land Robots

›
After seeking to dominate the air , it's time defense contractors turn back to innovating on the ground, especially when we speak of arm...
Thursday, March 08, 2007

UK Telecoms Lack of Web Site Privacy

›
When the U.S and Canada are the benchmark it's logical to conclude the U.K gets poor ratings as web site privacy especially in the comme...

Steganography Applications Hash Set

›
Did you know that there are over 600 applications capable of using steganography to hide data ? Me neither, but here's a company that...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.