Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

In the overwhelming sea of information, access to timely, insightful and independent open-source intelligence (OSINT) analyses is crucial for maintaining the necessary situational awareness to stay on the top of emerging security threats. This blog covers trends and fads, tactics and strategies, intersecting with third-party research, speculations and real-time CYBERINT assessments, all packed with sarcastic attitude

Friday, March 30, 2007

Cyber Traps for Wannabe Jihadists

›
I guess that's what happens when you don't have a single clue on where the real conversation and recruitment is happening, so you de...

IMSafer Now MySpace Compatible

›
MySpace, the world's most popular social networking site, and an online predator's dream come true has been actively discussed since...
Wednesday, March 28, 2007

Real Time Spam Shredding

›
Wednesday's portion of hahaha-ing. This is the work of a pragmatic genious, the revenge of the nerds or call it whatever you want the i...
Tuesday, March 27, 2007

You've Got Something in Your Eye

›
Or that's what the always getting bigger, Big Brother says : " Avigilon's 16 megapixel cameras are the first surveillance came...

Ghosts in the Keyboard

›
KeyGhost is a nasty type of hardware keylogger that if ignored as a concept can truly expose a lot of data, with one downsize - the logged ...
Thursday, March 22, 2007

Take this Malicious Site Down - Processing Order..

›
Yet another pay-pal-secure-login.tld domain gets registered, and even more ironic in its directory listings you'll be able to digg out ...

Tricking an UAV's Thermal Imagery

›
Give me a hug so that we become "thermally one" for the thermal paparazi to see . When you know how it works you can either improv...
Wednesday, March 21, 2007

Zoom Zoom Zoom - Boom!

›
If you could only eradicate the radicalization of immature islamic youth over the Internet with the push of a button. Great surgical shot!

A Documentary on CCTVs in the U.K

›
Every breath you take , every move you make, I'll be watching you. Used to be a great song, but has a disturbing context these days. Nin...

Unsigned Code Execution in Windows Vista

›
Nitin Kumar and Vipin Kumar are about to present the Vbootkit at the upcoming Blackhat and HITB cons : " We have been recently resea...
Tuesday, March 20, 2007

A Fortune 500 Blogosphere? Not Yet

›
Enterprise 2.0 is slowly gaining grounds and you cannot deny it despite top management's neutral position on yet another major " ...

Video on Analyzing and Removing Rootkits

›
Courtesy of WatchGuard part three of their malware analysis series walks you through various commercial and free utilities for detecting a...

Jihadists Using Kaspersky Anti Virus

›
I wonder what are the low lifes actually protecting themselves from? Malware attacks in principle, or preparing to prevent a malware infecti...

ASCII Art Spam

›
A spammer's biggest trade off - making it through anti-spam filters doesn't mean the email receipt will even get the slightest chan...
Monday, March 19, 2007

The Underground Economy's Supply of Goods

›
Symantec ( SYMC ) just released their latest Internet Security Threat Report , a 104 pages of rich on graphs observations, according to the ...

Subconscious Search Monopoly Sentiments

›
And hey, that's from someone attending the Microsoft MVP for N-th time : " I was invited to attend the Microsoft MVP Summit last we...

Spam Comments Attack on TechCrunch Continuing

›
In a previous post I commented on O'Reilly.com's war on spam according to their statistics, and thought you might find the most rec...

Personal Data Security Breaches Spreadsheet

›
Some stats try to emphasize on the number of people affected while forgetting the key points I outlined in a previous post related to why ...

Complexity and Threats Mind Mapping

›
The folks at Security-Database.com -- who by the way expressed their excitement over my blog -- just released an outstanding mind mapping g...
Wednesday, March 14, 2007

Threats of Using Outsourced Software - Part Two

›
Continuing the coverage on the U.S government's overall paranoia of using outsourced software on DoD computers, even hardware -- firm...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.