Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Friday, May 18, 2007

Commercializing Mobile Malware

›
Visionary enough, I predicted this over an year ago, and despite that for the time being there are only two publicly known pieces of mobile...
Thursday, May 17, 2007

Yet Another Malware Cryptor In the Wild

›
Just stumbled upon a newly released cryptor in the wild, and as I pointed out in a previous post related to yet another cryptor , they'r...
Wednesday, May 16, 2007

Corporate Espionage Through Botnets

›
Following my previous post on OSINT Through Botnets , here's a company that's categorizing Fortune 500 companies whose networks are...

Visual Script Obfuscation

›
We often talk and deobfuscate scripts aiming to hide their real and often malicious intentions . But what if malicious attackers have become...

The Jihadist Security Encyclopedia

›
A month ago, the Media Jihad Battalion started distributing a 118 pages long encyclopedia on anything starting from secure communications to...

Sampling Jihadists' IPs

›
Great idea as a matter of fact : " The following is based on an analysis of 4,593 IP addresses (1,452 unique IP addresses). The IPs we...
Monday, May 14, 2007

Mind Mapping Web 2.0 Threats

›
An informative, and for sure to be expanded mind map presenting various Web 2.0 threats courtesy of Mike Daw who by the way neatly integrat...

XSS The Planet

›
Yet another initiative proving that major sites indeed suffer from XSS vulnerabilities in exactly the same fashion E-banking sites do. Per...
Friday, May 11, 2007

Big Brother Awards 2007

›
I always liked the idea of emphasizing on the big picture when it comes to the worst privacy invadors on a worldwide basis compared to that ...
Thursday, May 10, 2007

Defeating Virtual Keyboards

›
To deal with the threat of keyloggers -- or to win time during te process of implementing two factor authentication and one-time-passwords-i...

International Cryptography Regulations Map

›
Regulations on importing, exporting and using encryption greatly vary across the world. Bert-Jaap Koops came up with some informative maps h...

Disintermediating the Major Defense Contractors

›
Innovative and cost-effective altogether? Think SpaceShipOne , a commercial space ship that didn't come from a major defense contractor,...
Tuesday, May 08, 2007

DDoS on Demand VS DDoS Extortion

›
There were recent speculations on the decline of DDoS attacks , in respect to the lack of companies actually paying to extortion attacks and...
Friday, May 04, 2007

A Chronology of a Bomb Plot

›
A very detailed overview of a bomb plot , especially the lines related to anything digital such as : - " An e-mail sent from Mr. Khawa...

Winamp PoC Backdoor and a Zero Day

›
Listen to your infection? Not necessarily as this backdoor binds cmd.exe on port 24501, but needs to be socially engineered in the form of ...
Wednesday, May 02, 2007

Anti-Censorship Lifestyle

›
Following a previous post on security lifestyle(s) , and in between the ongoing efforts to censor a 16 digit number I feel it's about t...

The Brandjacking Index

›
Picture a situation where a customer gets tricked into authenticating at the wrong site of company XXX. Would they do business with company ...
Monday, April 30, 2007

Cryptome Under Fire

›
John Young at Cryptome.org is reporting that its hosting provider decided to terminate their relationship on the basis of violating their ...

Video Demonstration of Vbootkit

›
Orignally introduced at this year's Blackhat con in Amsterdam, the Vbootkit is a kit showcasing the execution of unsigned code on Window...

Malicious Keywords Advertising

›
Blackhat SEO's been actively abused by spammers, phishers and malware authors, each of them contributing to the efficiency of the underg...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.