Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, March 27, 2007

You've Got Something in Your Eye

›
Or that's what the always getting bigger, Big Brother says : " Avigilon's 16 megapixel cameras are the first surveillance came...

Ghosts in the Keyboard

›
KeyGhost is a nasty type of hardware keylogger that if ignored as a concept can truly expose a lot of data, with one downsize - the logged ...
Thursday, March 22, 2007

Take this Malicious Site Down - Processing Order..

›
Yet another pay-pal-secure-login.tld domain gets registered, and even more ironic in its directory listings you'll be able to digg out ...

Tricking an UAV's Thermal Imagery

›
Give me a hug so that we become "thermally one" for the thermal paparazi to see . When you know how it works you can either improv...
Wednesday, March 21, 2007

Zoom Zoom Zoom - Boom!

›
If you could only eradicate the radicalization of immature islamic youth over the Internet with the push of a button. Great surgical shot!

A Documentary on CCTVs in the U.K

›
Every breath you take , every move you make, I'll be watching you. Used to be a great song, but has a disturbing context these days. Nin...

Unsigned Code Execution in Windows Vista

›
Nitin Kumar and Vipin Kumar are about to present the Vbootkit at the upcoming Blackhat and HITB cons : " We have been recently resea...
Tuesday, March 20, 2007

A Fortune 500 Blogosphere? Not Yet

›
Enterprise 2.0 is slowly gaining grounds and you cannot deny it despite top management's neutral position on yet another major " ...

Video on Analyzing and Removing Rootkits

›
Courtesy of WatchGuard part three of their malware analysis series walks you through various commercial and free utilities for detecting a...

Jihadists Using Kaspersky Anti Virus

›
I wonder what are the low lifes actually protecting themselves from? Malware attacks in principle, or preparing to prevent a malware infecti...

ASCII Art Spam

›
A spammer's biggest trade off - making it through anti-spam filters doesn't mean the email receipt will even get the slightest chan...
Monday, March 19, 2007

The Underground Economy's Supply of Goods

›
Symantec ( SYMC ) just released their latest Internet Security Threat Report , a 104 pages of rich on graphs observations, according to the ...

Subconscious Search Monopoly Sentiments

›
And hey, that's from someone attending the Microsoft MVP for N-th time : " I was invited to attend the Microsoft MVP Summit last we...

Spam Comments Attack on TechCrunch Continuing

›
In a previous post I commented on O'Reilly.com's war on spam according to their statistics, and thought you might find the most rec...

Personal Data Security Breaches Spreadsheet

›
Some stats try to emphasize on the number of people affected while forgetting the key points I outlined in a previous post related to why ...

Complexity and Threats Mind Mapping

›
The folks at Security-Database.com -- who by the way expressed their excitement over my blog -- just released an outstanding mind mapping g...
Wednesday, March 14, 2007

Threats of Using Outsourced Software - Part Two

›
Continuing the coverage on the U.S government's overall paranoia of using outsourced software on DoD computers, even hardware -- firm...
Monday, March 12, 2007

Timeline of Iran's Nuclear Program

›
Iran's a rising star these days. It's not just that the country recently launched it's first missile into space despite efforts...

Google Maps and Privacy

›
I thought I've seen the best close-ups from Google Maps in the top 10 naked people on Google Earth , but this screenshot is spooky as t...

Touching the Future of Productivity

›
Visualization in military brienfings and intelligence gathering has been a daily lifestyle of analysts for years, but combining visualizati...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.