Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Sunday, October 21, 2007

China's Cyber Warriors - Video

›
Originally aired on Discovery Channel, this documentary on Chinese hackers is worth watching in the wake of the recent speculations of Chin...
Saturday, October 20, 2007

Random Flickr Jewel - Hold it Right There!

›
If you don't respect your privacy, or at least put efforts into preserving it - you don't deserve any, it's simple. Great shot ...
Friday, October 19, 2007

eCrime Researchers Summit 2007 - Papers Available

›
Some informative papers covering various aspects of analyzing and protecting against phishing attacks were made available at the beginning o...

Everyone's Guide to By-Passing Internet Censorship

›
Following the recently released " Journey to the Heart of Internet Censorship " report, University of Toronto's Citizen Lab t...
Thursday, October 18, 2007

The Russian Business Network

›
In case you haven't come across it before, here's an informative blog whose objective is to track events related to the Russian Busi...
Wednesday, October 17, 2007

Thousands of IM Screen Names in the Wild

›
In the past, malware interested in establishing a one-to-one social engineering communication channel with potential victims, used to crawl ...
Tuesday, October 16, 2007

MPack and IcePack Localized to Chinese

›
It is logical to consider the possibility that once a malware author starts evaluating the benefits out of releasing a malware in an open s...

Fast Fluxing Yet Another Pharmacy Scam

›
Spam and phishing are indeed starting to operate behind the curtains of a fast-flux network of constantly changing IPs of malware infected ...

DIY German Malware Dropper

›
Yet another publicly available DIY malware dropper this time courtesy of German compared to Russian malware crews, whose releases on the oth...
Monday, October 15, 2007

The Global Security Challenge - 2007

›
The Global Security Challenge have just announced the world's five most promising security startups chosen to compete at the GSC Final...
Saturday, October 13, 2007

Managed Spamming Appliances - The Future of Spam

›
What's the future of spam? Spammers breaking CAPTCHAs of legitimate email providers and take advantage of their clean IP reputation to ...
Thursday, October 11, 2007

A Journey to the Heart of Internet Censorship

›
Reporters Without Borders just released their latest report on China's Internet Censorship practices , outlining how exactly bureaucrac...

Does This Blog Speak for Itself?

›
Before January 2007, I could only say that I'm glad to have you as a reader of this blog, but with the Talkr-ization of my blog during ...

Fast-Flux Spam and Scams Increasing

›
As I pointed out in my last series of posts assessing pharmaceutical scams and phishing campaigns, both, botnet masters , pharma masters , a...
Wednesday, October 10, 2007

Compromised Sites Serving Malware and Spam

›
Wish it was the average .cn domain I'm referring to, in this case it's the web sites of three U.S towns, namely the City of Chetek ,...

Incentives Model for Pharmaceutical Scams

›
Sometimes, it's unbelievable how easy is in fact to social engineer people on their way to "make a deal" online, especially wh...
Monday, October 08, 2007

Assessing a Rock Phish Campaign

›
The majority of Rock Phish campaigns usually take advantage of a single domain that's hosting numerous different phishing scams targe...
Friday, October 05, 2007

People's Information Warfare Concept

›
Malicious Culture of Participation DoS battle stations operational in the name of the " Please, input your cause ". Preventing a m...
Wednesday, October 03, 2007

DIY CAPTCHA Breaking Service

›
Given that spammers and phishers are already breaking, bypassing our outsourcing their CAPTCHA breaking needs, the introduction of a DIY ( ...

CISRT Serving Malware

›
The Chinese Internet Security Response Team is reporting that it has found embedded IFRAMEs serving malware within some of its pages. And d...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.