Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, July 25, 2007

Malware Embedded Sites Increasing

›
The emerging trend of malware embedded sites Malware embedded web sites are steadily gaining a priority in an attacker's arsenal of infe...
Thursday, July 19, 2007

SQL Injection Through Search Engines Reconnaissance

›
In previous posts " Google Hacking for Vulnerabilities " ; " Google Hacking for Cryptographic Secrets " and " Natio...
Wednesday, July 18, 2007

A Multi Feature Malware Crypter

›
Compared to the malware crypters I covered in previous posts -- part of the Malicious Wild West series -- this one is going way beyond t...

Bluetooth Movement Tracking

›
Passing by the local Hugo Boss store, all of a sudden you receive a SMS message - " It's obvious you like out new suits collection ...
Tuesday, July 17, 2007

Targeted Extortion Attacks at Celebrities

›
Who else wants to hack celebrities besides wannabe uber leet h4x0rs looking for fame while brute forcing with username "Philton" a...
Wednesday, July 11, 2007

Insecure Bureaucracy in Germany

›
First, it was data mining 22 million credit cards to see who purchased access to a set of child porn sites to figure out the obvious - that...

E-commerce and Privacy

›
Privacy should be a main concern for everyone, not because you have something to hide , but because you deserve it, it's your right, whi...
Monday, July 09, 2007

The Extremist Threat from Metallica

›
No, this is serious - James Hetfield from Metallica questioned by airport security personel before the Live Earth concert in London because...

Terrorist Groups' Brand Identities

›
The author of this terrorist groups' logos compilation is greatly using business logos identity building analogy to discuss whether or ...
Friday, July 06, 2007

Zero Day Vulnerabilities Auction

›
Theory and speculation, both finally materialize - an 0bay auction for security vulnerabilities was recently launched, aiming to reboot the...
Thursday, July 05, 2007

Hacking the iPhone

›
Faster than you can say hacked! In the first days of what can be described as yet another case study on marketing buzz generation done by ev...
Wednesday, July 04, 2007

Mujahideen Harvest Magazine - Issue 41

›
Compared to the quarterly released Technical Mujahid E-zine, the yearly updated Jihadist Security Enclopedia , or the regularly updated te...
Friday, June 29, 2007

Exploits Serving Domains - Part Two

›
The saying goes that there's no such thing as free lunch, so let me expand it - there's no such thing as free pr0n, unless you don...
Thursday, June 28, 2007

Post a Crime Online

›
In exactly the same fashion of Chicago's Crime Database , a community powered site integrating crime reports on Google Maps, Postacrime....
Wednesday, June 27, 2007

Exploits Serving Domains

›
More cyber leads from the previous analysis of Mpack embedded dekalab.info with a particular malicious domains farm emphasis as follows. ...
Tuesday, June 26, 2007

Early Warning Security Event Systems

›
Years ago, early warning systems for security events used to be a proprietary service available to a vendor's customers only, or even wo...
Monday, June 25, 2007

Security Comic Strips

›
If all rest is a commodity but attitude, let me introduce you to the first two additions from my new Unstripped Security comic strips serie...

Cell Phone Stalking

›
Six year olds install hardware keyloggers at the U.K's Parliament , and now as you can listen to the sweet sixteen's voice in this ...
Friday, June 22, 2007

The MPack Kit Attack on Video

›
Video demonstration of MPack courtesy of Symantec, goes through various infected sites and showcases the consequences of visiting them : ...

A Blacklist of Chinese Spammers

›
With China no longer feeling pround of its position in the top 3 main sources of spam on a worldwide basis, the coutry is going a step beyon...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.