Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, June 07, 2007

An Analysis of the Technical Mujahid - Issue Two

›
Good afternoon everyone, shall we enjoy some fried cyber jihadists for lunch? I'd say let's go for it. After analyzing issue one of ...
Wednesday, June 06, 2007

Security Cartoons

›
Despite that the main goal of the initiative is to build better awareness among the average Internet user through security cartoons , it...

CIA's "Upcoming" Black Ops Against Iran

›
Recent articles pointing out on a U.S President Bush's clearance for CIA black operations against Iran , make it sound like it's som...
Monday, June 04, 2007

g0t XSSed?

›
Following previous posts on XSSing The Planet and XSS Vulnerabilities in E-banking Sites , here's a full disclosure project that's...

Data Breach Sample Letters of Notification

›
Dear customer, to ensure your satisfaction with our quality services we're notifying you that our inability to protect your sensitive da...
Thursday, May 31, 2007

MSN Spamming Bot

›
An image is sometimes worth a thousand words. This is a screenshot of infected bots spreading spam messages at MSN via typical !spam IRC bas...
Wednesday, May 30, 2007

The WebAttacker in Action

›
Interesting to see that the WebAttacker kit can still be seen in the wild. Here are the redirectors in action : Input URL : _http://rulife....

The Revenge of the Waitress

›
Think your scrooge tips will achieve their effect? Think twice but don't put the emphasis on underpaid waitresses, rather on the overall...

Reverse Engineering the ANI Vulnerability

›
Informative video analyzing the ANI cursor vulnerability , part of the Google TechTalks series. " Alex Sotirov is a vulnerability engin...
Tuesday, May 29, 2007

Phrack Magazine's Latest Issue

›
Phrack is back believe it or not with its latest Issue 64 released two days ago. The style is still so old-school, so authentic it makes yo...

Google Hacking for Vulnerabilities

›
Tools like these are a clear indication in the interest of gathering targets through google hacking techniques and SQL injecting them using ...
Wednesday, May 23, 2007

Microsoft's Forefront Ad Campaign

›
The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority...

Jihadists' Anonymous Internet Surfing Preferences

›
Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities a...

Counter Espionage Tips from the Cold War

›
There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting ...
Tuesday, May 22, 2007

A Client Application for "Secure" E-banking?

›
This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. ...

A Malware Loader For Sale

›
Continuing the Shots from the Malicious Wild West series and the yet another malware tool in the wild posts, here’s a recently advertised ...
Monday, May 21, 2007

MySpace's Sex Offenders Problem

›
MySpace, being one of the most popular social networking sites is always under fire on its efforts to combat known child offenders registeri...
Saturday, May 19, 2007

Tricking a Laptop's Fingerprint Authentication

›
The joys of fingerprint biometrics with a duplicate fingerprint of the original .
Friday, May 18, 2007

Commercializing Mobile Malware

›
Visionary enough, I predicted this over an year ago, and despite that for the time being there are only two publicly known pieces of mobile...
Thursday, May 17, 2007

Yet Another Malware Cryptor In the Wild

›
Just stumbled upon a newly released cryptor in the wild, and as I pointed out in a previous post related to yet another cryptor , they'r...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.