Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, July 09, 2008

Mobile Malware Scam iSexPlayer Wants Your Money

›
A bogus media player ( iSexPlayer.jar ) targeting Symbian S60 3rd edition devices according to several affected parties, is currently being ...

Storm Worm's U.S Invasion of Iran Campaign

›
The Storm Worm-ers are keeping themselves busy, with two campaigns in less than a week, following the latest on the 4th of July . Now, they ...
Tuesday, July 08, 2008

Fake Porn Sites Serving Malware - Part Two

›
This summary is not available. Please click here to view the post.
Monday, July 07, 2008

The Risks of Outdated Situational Awareness

›
It's been two months since I analyzed the proprietary email and personal information harvesting tool targeting major career web sites -...

The ICANN Responds to the DNS Hijacking, Its Blog Under Attack

›
Last week, the ICANN has issued an official statement regarding last month's DNS hijackings of some of their domains : " The DNS r...

Lithuania Attacked by Russian Hacktivists, 300 Sites Defaced

›
Last week's mass defacement of over 300 Lithuanian sites hosted on the same ISP, an upcoming attack that was largely anticipated due to...
Friday, July 04, 2008

The Antivirus Industry in 2008

›
The folks at Ikarus Security Software seem to have enjoyed drinking of the truth serum , to come up with such a realistic retrospective of ...
Thursday, July 03, 2008

Gmail, Yahoo and Hotmail’s CAPTCHA Broken

›
It's one thing to start efficiently registering thousands of email accounts at reputable email providers by automatically breaking their...
Wednesday, July 02, 2008

Chinese Bloggers Bypassing Censorship by Blogging Backward

›
With China trying to silence over 30,000 rioters during the weekend, by deleting forum postings and deactivating accounts mentioning the rio...
Tuesday, July 01, 2008

Decrypting and Restoring GPcode Encrypted Files

›
The futile attempt to directly attack the encryption algorithm used by the GPcode ransomware, is prompting Kaspersky Labs to invest in a mor...

Summarizing June's Threatscape

›
June's threatscape that I'll summarize in this post based on all the research conducted during the month, was a very vibrant one. Wi...
Monday, June 30, 2008

The Malicious ISPs You Rarely See in Any Report

›
The recently released badware report entitled “ May 2008 Badware Websites Report " lists several Chinese netblocks tolerating maliciou...
Friday, June 27, 2008

ICANN and IANA's Domain Names Hijacked by the NetDevilz Hacking Group

›
The official domains of ICANN , the Internet Corporation for Assigned Names and Numbers, and IANA , the Internet Assigned Numbers Authority ...
Thursday, June 26, 2008

Right Wing Israeli Hackers Deface Hamas's Site

›
Compared to historical hacktivism tensions between different nations, Israeli and Palestinian hacktivists seem to be most sensitive to ...
Wednesday, June 25, 2008

Backdoording Cyber Jihadist Ebooks for Surveillance Purposes

›
It appears that cyber jihadists are striking back at the academic and intelligence community, by binding their propaganda Ebooks with malwar...

Fake Porn Sites Serving Malware

›
Ah, that RBN with its centralization mentality for the sake of ease of management and 99.999% uptime. In this very latest example of using m...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.