Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, April 12, 2007

Mujahideen Secrets Encryption Tool

›
Remember Mujahideen Secrets , the jihadist themed encryption tool released by the Global Islamic Media Front (GIMF) to aid cyber jihadists ...
Tuesday, April 10, 2007

Shots from the Malicious Wild West - Sample Four

›
My previous "shots" related to various pieces of malware, packers, or on the fly malicious URL analysis will continue to expand wi...

Month of Malware Bugs Coming

›
This will prove to be interesting as it's directly related with a previous discussion on hijacking or shutting down someone else's ...
Monday, April 09, 2007

Lie Detecting Software for Text Communications

›
The art of money wasting when there's a surplus of research grants and no one to pick them, or a product concept myopia ? $680,000 have ...
Wednesday, April 04, 2007

Hijacking Your Fear

›
Have no fear, the toxoplasma gondii parasite is here. Just like a decent piece of malware exploiting a zero day vulnerability in an anti vi...

Interacting with Spam Emails

›
Unbelievable, and you wonder why is spam on the verge of destroying email as the once so powerful communication medium. What I don't lik...

Taking Down Phishing Sites - A Business Model?

›
Processing orders for taking down malicious or fraudulent web sites is gaining grounds with not just RSA providing the service, but also, w...
Sunday, April 01, 2007

Cyberpunk is Dead!

›
Yeah sure, on the 1st of April only! Enjoy this marvelous cyberpunk compilation with Juno Reactor as a background music. A group whose wor...
Friday, March 30, 2007

Cyber Traps for Wannabe Jihadists

›
I guess that's what happens when you don't have a single clue on where the real conversation and recruitment is happening, so you de...

IMSafer Now MySpace Compatible

›
MySpace, the world's most popular social networking site, and an online predator's dream come true has been actively discussed since...
Wednesday, March 28, 2007

Real Time Spam Shredding

›
Wednesday's portion of hahaha-ing. This is the work of a pragmatic genious, the revenge of the nerds or call it whatever you want the i...
Tuesday, March 27, 2007

You've Got Something in Your Eye

›
Or that's what the always getting bigger, Big Brother says : " Avigilon's 16 megapixel cameras are the first surveillance came...

Ghosts in the Keyboard

›
KeyGhost is a nasty type of hardware keylogger that if ignored as a concept can truly expose a lot of data, with one downsize - the logged ...
Thursday, March 22, 2007

Take this Malicious Site Down - Processing Order..

›
Yet another pay-pal-secure-login.tld domain gets registered, and even more ironic in its directory listings you'll be able to digg out ...

Tricking an UAV's Thermal Imagery

›
Give me a hug so that we become "thermally one" for the thermal paparazi to see . When you know how it works you can either improv...
Wednesday, March 21, 2007

Zoom Zoom Zoom - Boom!

›
If you could only eradicate the radicalization of immature islamic youth over the Internet with the push of a button. Great surgical shot!

A Documentary on CCTVs in the U.K

›
Every breath you take , every move you make, I'll be watching you. Used to be a great song, but has a disturbing context these days. Nin...

Unsigned Code Execution in Windows Vista

›
Nitin Kumar and Vipin Kumar are about to present the Vbootkit at the upcoming Blackhat and HITB cons : " We have been recently resea...
Tuesday, March 20, 2007

A Fortune 500 Blogosphere? Not Yet

›
Enterprise 2.0 is slowly gaining grounds and you cannot deny it despite top management's neutral position on yet another major " ...

Video on Analyzing and Removing Rootkits

›
Courtesy of WatchGuard part three of their malware analysis series walks you through various commercial and free utilities for detecting a...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.