Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, May 29, 2007

Phrack Magazine's Latest Issue

›
Phrack is back believe it or not with its latest Issue 64 released two days ago. The style is still so old-school, so authentic it makes yo...

Google Hacking for Vulnerabilities

›
Tools like these are a clear indication in the interest of gathering targets through google hacking techniques and SQL injecting them using ...
Wednesday, May 23, 2007

Microsoft's Forefront Ad Campaign

›
The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority...

Jihadists' Anonymous Internet Surfing Preferences

›
Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities a...

Counter Espionage Tips from the Cold War

›
There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting ...
Tuesday, May 22, 2007

A Client Application for "Secure" E-banking?

›
This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. ...

A Malware Loader For Sale

›
Continuing the Shots from the Malicious Wild West series and the yet another malware tool in the wild posts, here’s a recently advertised ...
Monday, May 21, 2007

MySpace's Sex Offenders Problem

›
MySpace, being one of the most popular social networking sites is always under fire on its efforts to combat known child offenders registeri...
Saturday, May 19, 2007

Tricking a Laptop's Fingerprint Authentication

›
The joys of fingerprint biometrics with a duplicate fingerprint of the original .
Friday, May 18, 2007

Commercializing Mobile Malware

›
Visionary enough, I predicted this over an year ago, and despite that for the time being there are only two publicly known pieces of mobile...
Thursday, May 17, 2007

Yet Another Malware Cryptor In the Wild

›
Just stumbled upon a newly released cryptor in the wild, and as I pointed out in a previous post related to yet another cryptor , they'r...
Wednesday, May 16, 2007

Corporate Espionage Through Botnets

›
Following my previous post on OSINT Through Botnets , here's a company that's categorizing Fortune 500 companies whose networks are...

Visual Script Obfuscation

›
We often talk and deobfuscate scripts aiming to hide their real and often malicious intentions . But what if malicious attackers have become...

The Jihadist Security Encyclopedia

›
A month ago, the Media Jihad Battalion started distributing a 118 pages long encyclopedia on anything starting from secure communications to...

Sampling Jihadists' IPs

›
Great idea as a matter of fact : " The following is based on an analysis of 4,593 IP addresses (1,452 unique IP addresses). The IPs we...
Monday, May 14, 2007

Mind Mapping Web 2.0 Threats

›
An informative, and for sure to be expanded mind map presenting various Web 2.0 threats courtesy of Mike Daw who by the way neatly integrat...

XSS The Planet

›
Yet another initiative proving that major sites indeed suffer from XSS vulnerabilities in exactly the same fashion E-banking sites do. Per...
Friday, May 11, 2007

Big Brother Awards 2007

›
I always liked the idea of emphasizing on the big picture when it comes to the worst privacy invadors on a worldwide basis compared to that ...
Thursday, May 10, 2007

Defeating Virtual Keyboards

›
To deal with the threat of keyloggers -- or to win time during te process of implementing two factor authentication and one-time-passwords-i...

International Cryptography Regulations Map

›
Regulations on importing, exporting and using encryption greatly vary across the world. Bert-Jaap Koops came up with some informative maps h...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.