Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju

  • Home
  • Twitter
  • LinkedIn
  • Facebook
  • Wikipedia
  • Grokipedia
  • Archive.org
  • Contact

DIY Malware Droppers in the Wild

0
June 12, 2007
The revenge of the script kiddies, or the master minds releasing DIY tools to let 'em generate enough noise as I've pointed out in my future trends of malware paper? Further expanding the Malicious Wild West series, here are two more recently released DIY malware droppers. The detection rate for the generated dropper of the first one is disturbing given it's not even crypted :

AVG - 06.12.2007 - Downloader.VB.KK
NOD32v2 - 06.12.2007 - probably unknown NewHeur_PE virus
Panda - 06.12.2007 - Suspicious file

No AV detects the packer itself!

File size: 311296 bytes
MD5: 1944378cba81bcd894d43d71dc5fccb5
SHA1: 920505f2124e8a477ab26a28f81a779d717882be

The second one has a much higher detection rate of both the packer and the dropper :

File size: 19001 bytes
MD5: abad61857c4b79773326496dec11929b
SHA1: 5c74c3572febf7f468b41d9bdc5cbc19eb2348b5

PandaLabs has recently conducted a study on the increasing use of packers and cryptors by malware authors worth mentioning :

"There are many different packers. According to the PandaLabs study, UPX is the most common and is used in 15 percent of the malware detected. PECompact and PE, are used in 10 percent of cases. However, according to PandaLabs, there are more than 500 types of packers that could be used by cyber-crooks. “In essence it is a stealth technique. The increasing use of these programs highlights how keen Internet criminals are for their creations to go undetected,” explains Luis Corrons, technical director of PandaLabs."

You may also be interested in finding out how popular anti virus vendors perform agains known, but crypted malware.

Related posts:
A Malware Cryptor
A Malware Cryptor 2
A Malware Loader Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Homosexual Warfare

0
June 12, 2007
Applause for the non-lethal weapons R&D, but a Gay Bomb using aphrodisiacs to provoke sexual behaviour on the field courtesy of the Pentagon, is far more creative than a vomit beam for instance :

"In one sentence of the document it was suggested that a strong aphrodisiac could be dropped on enemy troops, ideally one which would also cause "homosexual behaviour". The aphrodisiac weapon was described as "distasteful but completely non-lethal". In its "New Discoveries Needed" section, the document implicitly acknowledges that no such chemicals are actually known."

Just imagine the situation when a century later, a futuristic History Channel displays holograms of such warfare activities. More info on the Gay Bomb, as well as video of soldiers on LSD -- exceptional warriors win their battles without waging wars. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Censoring Flickr in China

0
June 12, 2007
Since I've been discussing China's Internet censorship practices, and I've been doing it pretty much since I've started blogging, this is the most recent example of how what's thought to be the most robust and sophisticated censorship system in world is a useless technological solution if not implemented "properly". The news of the government censoring a very popular site will spread faster, but instead of applying the predefined subversive content detection practice and allow anything else, they're mocking their overhyped censorship system by blocking the entire site instead of either removing the content in question or blocking access to the specific Flickr set. Futile attempt? For sure, but far more gentle approach of censorship compared to the current one.

Various news sources reported that China's censoring the entire Flickr. As you can see the greatfirewallofchina.org test confirms the block, but it also confirms that Flickr.com itself is not censored but any other content within. How come? The idea is that the user user is left with the impression that it's a technical glitch at Flickr.com compared to receiving a censorship warning or even a 404 when accessing the main page. Logging in Flickr is possible -- verified though a Beijing based proxy manually -- uploading is also possible, but not content can be seen.

Flickr = a Yahoo! media company with which the Chinese government has been keeping close ties in the past so that jailed journalists started filling lawsuits against Yahoo. Various bloggers speculated that China banned the entire site due to the leak of protestor's photos on it, and taking into consideration China's ongoing censorship of mobile communications such as SMS messages which I covered in a previous post, you may notice that the first image of the received sms for the time and place of the protest is censored by the photographer herself, especially the time of receivement. The protest is also on YouTube, so would YouTube be logically next to get blocked? I doubt so as basically, the protest will position itself as an even more high priority issue for the Chinese government. The censorship trade-off, should you censor it and add more exclusiveness to it, or ignore and act like it's nothing serious? Undermine censorship by spreading the censored item further.

Even more interesting is the fact that couple of months ago, Google's shareholders were about to wage a proxy battle in order for them to convince top management in the long-term effects of censorship. Google convinced them that the revenues streaming from China with its near the top Internet population are more important and so they agreed. Obviously, Yahoo's shareholders are too, not keen of the fact that their investments are driving the oppression of Chinese citizens, and have recently proposed a similar resolution :

"Amnesty International has today (11 June) expressed its support for two shareholder resolutions up for vote at tomorrow's Yahoo! annual meeting in California, one calling on the company to oppose internet repression in countries such as China, and one requesting the creation of a corporate Board Committee on Human Rights."

New media companies are helpless and obliged under Chinese law to censor if they don't want to lose the option to do business in (Soviet) China, therefore a nation-2-nation actions must be taken especially from the world's major evalgelists of a free society and democracy. The rest is a twisted reality - a Tiananmen Square image search outside China, and a Tiananmen Square image search in China, everything's "in order". Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

An Analysis of the Technical Mujahid - Issue Two

0
June 07, 2007
Good afternoon everyone, shall we enjoy some fried cyber jihadists for lunch? I'd say let's go for it. After analyzing issue one of the Technical Mujahid couple of months ago, the post continues to be among the most popular ones at this blog, and best of all - I've virtually met with people whose knowledge intimacy I'd never ruin by physically meeting with them. In a globalized world, OSINT is your early warning system and a tool for establishing social responsibility as a citizen of world, and I'm still sticking to my old saying that an OSINT conducted - a tax payer's buck saved somewhere.

During March, 2007, the Al Fajr Information Center released the second issue of the Technical Mujahid E-zine (72 pages), a definite proof of their commitment towards educating the prone to brainwashing and radicalization wannabe jihadists. What has improved? Have the topics shifted from the general IT ones to start covering conventional weaponry discussions? Disturbingly yes. Whereas the topics still largely remain IT related, much more PSYOPS and discussion on weapons systems such as MANPADS- is included in the second issue. The myth of terrorists and jihadists using steganography is "thankfully" coming out of the dark despite how uncomfortable you may feel about it, from a strategic point of view, the low lifes are putting more efforts into educating the average jihadist on how to generate noise, so that the real conversation can continue with wannabe jihadists getting caught, and the true master minds remaining safe.
Case in point - the first issue of the magazine was covered by the several sources who seem to be aware of the forums where the real discussion and announcements are going, but the release of the second issue wasn't that well covered in comparison to their previous coverages. But how come? Is someone interested in getting a higher proportion of the upcoming departamental budget allocation with stories like we need petabytes of disk space and CPU on demand to analyze the ongoing conversations, or is the average citizen feeling more secure not knowing how aware both cyber and real life jihadists are? A picture is sometimes worth a thousand fears. Let's discuss the second issue of the Technical Mujahid by starting with the key summary points :

Key summary points :
- The second issue of the magazine is diversifying its content to include conventional weaponry articles, especially the nasty MANPADS
- Propaganda is largely increasing, thanks to automated translation software and keywords density analysis
- With articles such as the ABC of running and operating a Jihadist site online, the authors of the magazine are aiming to generate even more noise
- There's a very experienced team of multimedia/creative designers applying professional layouts to the magazine and the articles

01. Article One - An Overview of Steganography and Covert Communications

Article one is continuation from the discussion opened in the first issue on the basics of steganography and encryption. Rich on visual material as always, it covers a surprising number of steganographic techniques starting from watermarking, and also commenting on the process of steganalysis and how degrading the quality of an image let's say, is a major trade-off compared to encryption for instance. The article also includes a comparison of colors histogram of an original image and a steganographic one to showcase the trade-off. What makes an impression is the evolving editorial and DIY tutorials with definitions of technical terms at the end of each article and their Arabic translation..

Key terms from article one :

Steganography (Steganos graphy); Steganalysis; Morse Code; Digital Signal and Image Processing; Watermarking; LSB (Least Significant Bit); MSB (Most Significant Bit); Histogram (Frequency distribution of RGB); One Way Encryption; Discrete Cosine Transform (Coefficients); Enhanced LSB Layers Analysis.

Moreover, an exampe is given where Islamic military communications in Iraq are hidden in a 100x50 pixel picture. Feeling uncomfortable with the idea of jihadists using steganography for communications? So do I, but keeping it realistic instead of denying the reality is even worse than actually admitting it. Something else is important to understand as well, and that's to overall lack of situational awareness of the average citizen in any contrying, still living in the stereotype of bunch of folks making plans on the sand in a distant cave somewhere in the mountains. Your desire to remain what you are is what limits you.

It also worth discussing why are they including English-to-Arabic translations of technical terms, and I think the main goal is to provoke readers to start searching the Arabic web for related articles, perhaps a good moment to break the stereotype a mention that online jihadi communities is where visitors convert to talkers, and later on doers.

02. Article Two - Creating a Jihadist's Site for Newbies

In order for jihadists to generate more noise and build a loyal army of believers, the authors have taken the time and effort to explain the basics of web design, web hosting, and various other issues related to building a jihadists site from scratch. In times of "war on ideologies", the bigger the community, the higher chance for possible recruitment.

03. Article Three - An Overview of Short Range Shoulder-Fired Missiles

From ITsecurity to conventional weaponry articles, the shift is very interesting one, especially the in-depth knowledge on various systems and the countermeasures aircraft have against MANPADS. What's worth mentioning is the PSYOPS motive of jihadist's sandal on the top of a scrap from an obviously taken down helicopter. The articles concludes with detailed technical specifications of MANpads and by highlighting the dominance of the Russian IGLA system.

Key terms from article three :

Infrared (wavelength greater than 0.7 micron); Ultraviolet (UV: wavelength less than 0.4 micron); Infrared seeker head; IFF (Identification Friend or Foe) antenna; Digital signal processing (DSP); Counter-Countermeasures(CCM); Directed infrared countermeasures [DIRCM]; Sensor- Mercury Cadmium Telluride (HgCdTe) 1- 24mm; Sensor- Indium Antimonide (InSb) 1-5.5mm

04. Article Four - Basics and Importance of Encryption
Even wondered how Alice and Bob talk exchange keys in Arabic? This article explains in detail the basics and importance of encryption, and compared to issue one of the technical mujahid which was recommending PGP, the author is now recommending the Mujahideen Secrets encryption tool.

05. Article Five - Basics of Video Recording and Subtitling Clips
Wonder how did the whole jihadist multimedia revolution start? As it seems, there's a team of "reporters" attached to militant groups to take recordings of the battles and later one include propaganda background music and subtitle them to acheive an even more influential effect on their audience.

Dear wannabe jihadists - if your definition of existence consists in your futile attempt to achieve a knowledge-driven jihadist community in the form of generating noise with armies of religiously brainwashed soldiers, you face extinction it's that very simple.
Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Security Cartoons

0
June 06, 2007
Despite that the main goal of the initiative is to build better awareness among the average Internet user through security cartoons, it's also very entertaining for someone professionally in the field. The original press release :

"The cartoons we have developed obviously are not a textbook approach, not made for professional journals or geared to an audience of professional researchers," said Srikwan, who is the graphic designer of www.SecurityCartoon.com. "We wanted this to be accessible to anyone who uses the Internet -- general consumers, teenagers, teachers and anybody who banks or shops online. That's why the cartoon format is perfect -- everybody can relate to it. The cartoons cover online security issues such as phishing, pharming, malware, spoofing and password protection. But as opposed to most other educational efforts relating to these topics, the cartoons do not only teach its readers what to do and not to do, but why, too."

Is building security awareness in the age of malicious economies of scale worth the investment in terms of outsourcing the program details to an experienced vendor? You bet, and what I especially like about the cartoons collection is its vendor-independent position, namely it's not promoting the idea of the product concept myopia and product as the solution to the threat, but vigilance and maintaining a decent situational awareness while online. The rest is up to a vendor's marketing and sales department trying to hopefully get more customers and prove their solution outperforms the rest of the vendors, compared to a profit-margin centered vendor, trying to squeeze out the juice from a commoditized product or a solution but lacking any major differentiation points.

Here are two more great collections of security cartoons as well. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

CIA's "Upcoming" Black Ops Against Iran

0
June 06, 2007
Recent articles pointing out on a U.S President Bush's clearance for CIA black operations against Iran, make it sound like it's something the CIA haven't been doing for decades already. Here's an example of a spy thriller in real life on how the CIA helped U.S embassy workers escape the country unharmed during Iran's revolution by using a fake sci-fi movie production as an excuse :

"He was stuck. For about a week, no one in Washington or Ottawa could invent a reason for anyone to be in Tehran. Then Mendez hit upon an unusual but strangely credible plan: He'd become Kevin Costa Harkins, an Irish film producer leading his preproduction crew through Iran to do some location scouting for a big-budget Hollywood epic. Mendez had contacts in Hollywood from past collaborations. (After all, they were in the same business of creating false realities.) And it wouldn't be surprising, Mendez thought, that a handful of eccentrics from Tinseltown might be oblivious to the political situation in revolutionary Iran. The Iranian government, incredibly, was trying to encourage international business in the country. They needed the hard currency, and a film production could mean millions of US dollars."

Today's active black ops doctrine isn't hapenning without Iran taking notice of course :

"Other Iranian Americans also have been prohibited from leaving Iran in recent months, including Parnaz Azima, a journalist for the U.S.-funded Radio Farda; Ali Shakeri, a founding board member of the Center for Citizen Peacebuilding at the University of California, Irvine; and Kian Tajbakhsh, consultant working for George Soros' Open Society Institute."

Realizing the U.S's inability to wage conventional war on yet another front -- from a PR point of view not lack of capacity -- the CIA is logically putting more efforts into undermining a religious regime where it hurts most - Iran's overall isolation from the world's economic markets and a fact with which no one from the international community is feeling comfortable with, namely, Iran's continuing efforts to supply the enemies -- Hezbollah -- of its enemies -- the U.S -- with technology and know how that was supposedly hard to acquire.

Capitalism has the power to undermine any regime except perhaps one whose foundations are purely religious such as with Islam, therefore dirty tricks like the ones fabricating evidence and making the average Iranian perceive its current rulers as a corrupt puppets of behind a power-driven vision, seems to be a way of destabilizing the regime. Another recent example of an unamed intelligence agency's PSYOPS team aiming to a achieve a disorted media-echo by distributing false rumors and relying on that basis that there's truth in every rumour, was that of Muammar Gaddafi's coma speculations that quickly spread around the world. But what was the purpose of this hoax? Let's clarify - to achieve a media echo effect abusing the mainstream media's major weakness in respect to always trying to be the first to spread a ground breaking event. What did the colonel do once he found out he was in a come? Instead of ignoring, he fell victim into an even more well-thought of trap, and responded that the'll sue the news agency that came up with the hoax, thus, achieving an even more sucessful media echo effect. If you want to destroy a regime, you destroy it from inside-to-outside, not the other way around and perhaps the key objective of this PSYOPS was to help the regime's citizen's envision a future without their leader, even for a few hours before the fact is once again on the front pages. Ingenious intelligence thinking.

PSYOPS and BLACKOPS intersect and these are among the many practial examples I pointed out in a previous post :

- your web sites spread messages of your enemies
- sms messages and your voice mail say you're about to lose the war
- your fancy military email account is inaccessible due to info-warriors utilizing the power of the masses, thus script kiddies to distract the attention
- you gain participation, thus support
- you feel like Johnny Mnemonic taking the elevator to pick up the 320 GB of R&D data when a guerilla info-warrior appears on the screen and wakes you up on your current stage of brainwashing
- starting from the basics that the only way to ruin a socialist type of government is to introduce its citizens to the joys of capitalism -- it always works
- hacktivism - traffic acquisition plus undermining confidence
- propaganda - North Korea is quite experienced
- self-serving news items, commissioned ones
- achieving Internet echo as a primary objective
- introducing biased exclusiveness
- stating primary objectives as facts that have already happened
- impersonation Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

g0t XSSed?

0
June 04, 2007
Following previous posts on XSSing The Planet and XSS Vulnerabilities in E-banking Sites, here's a full disclosure project that's basically categorizing user-submitted XSS vulnerabilities by pagerank/government/public entity, with mirrored XSSed pages.

Even a .secured TLD name is nothing more than a false feeling of security with phishers still loading content from E-banking providers' sites, and actively exploiting XSS vulnerabilities to make their scams use the bank's site. Therefore from a business development perspective you ought to realize that overperforming in a developing market segment, is sometimes more profitable than being a pioneer with an idea the market's not willing to anticipate for the time being -- perhaps for the best. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Data Breach Sample Letters of Notification

0
June 04, 2007
Dear customer, to ensure your satisfaction with our quality services we're notifying you that our inability to protect your sensitive data has resulted in its leakage on the World Wide Web thus, stay tuned for possible identity theft and spending the next couple of years explaining how it wasn’t you who bought that luxurious yacht your bank wants you to pay for. By the time our stolen laptops get connected to the Internet -- which we doubt anyway -- they will phone back helping us locate them which doesn’t mean we didn’t breach the confidentiality of your personal information, and are just trying to be socially responsible in the time of notification.

Sincerely,
Your favorite and customer-friendly breached retailer

Perhaps the most comprehensive archive of scanned data breach letters of notification on U.S based companies, I've come across to so far. Well worth going through in case you wonder on what tone does a breached company use to maintain its weakened brand image, and to prevent a PR disaster.

Related posts:
To report, or not to report?
Personal Data Security Breaches - 2000/2005
A Chart of Personal Data Security Breaches 2005-2006
Getting paid for getting hacked
Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

MSN Spamming Bot

0
May 31, 2007
An image is sometimes worth a thousand words. This is a screenshot of infected bots spreading spam messages at MSN via typical !spam IRC based command and control. And here's a related article about malware on IM networks as well:

"It is not clear exactly why the number of IM attacks is increasing, but security researchers have their theories. Don Montgomery, vice president of marketing at Akonix, speculated the increase in the number of attacks reflects the increase in the use of instant messaging, particularly on corporate networks. "IM is becoming favored over e-mail as a distribution vector for malware as a result of e-mail security now being employed by 75 percent or more of companies, while IM security is only employed by 15 to 20 percent of companies," Montgomery said. "The hackers are simply turning to the open door."

Two options remain highly lucrative. Either someone’s spamming p3n1$ enlargement propositions and directing to a spam site, or the social engineering efforts aim at visiting an exploit hosting site. No more direct .pif; .scr; or .exe propositions in plain simple text, what’s exploited is mostly client side vulnerabilities and redirectors to break the ice. IM threats stats courtesy of Symantec's IMlogic and here’s a related post regarding the acquisition of the company with Symantec anticipating the emergence of this market segment and investing in it. IM propagation has it cyclical patterns which like pretty much all other propagation vectors reaching a mature level starts getting at least partly replaced by other ways of propagation. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

The WebAttacker in Action

0
May 30, 2007
Interesting to see that the WebAttacker kit can still be seen in the wild. Here are the redirectors in action :

Input URL: _http://rulife.info/traffic/go.php?sid=1
Effective URL: _http://greencunt.org/crap/index.php
Responding IP: 203.223.159.110
Name Lookup Time: 1.290261
Total Retrieval Time: 5.987628

=> _http://rulife.info/traffic/go.php?sid=1
=> _http://xorry.org/backup/atds/out.php?s_id=1
=> _http://greencunt.org/crap/index.php

What follows is the (sandboxed) infection : file: Write C:\Program Files\Internet Explorer\IEXPLORE.EXE -> C:\sysykiz.exe

Several more URLs are to be found at the "green" domain as well :
_http://greencunt.org/anna/fout.php
_http://greencunt.org/spl1/index.php

Despite that the tool is outdated compared to mature malware platforms and exploitation kits which I'll be covering in upcoming posts, the leak of its source code made it easy for someone to tweak it for their personal needs and simply feed with undetectable binaries, new vulnerabilities, and newly registered domains -- even hijacked ones through web application vulnerabilities for instance.

In case you're interested in a proof that attackers are still successfully infecting victims by using vulnerabilities for which patches have been released months ago, here's another URL that's exploiting two vulnerabilities at once namely :

MDAC ActiveX code execution (CVE-2006-0003)
IE COM CreateObject Code Execution (MS06-042)

The domain in question is - _http://www.avvcc.com and _http://www.avvcc.com/lineage/djyx.htm

Related posts:
RootLauncher Kit
Nuclear Grabber Kit
Shots from the Malicious Wild West - Sample Seven
Shots from the Malicious Wild West - Sample Six
Shots from the Malicious Wild West - Sample Five
Shots from the Malicious Wild West - Sample Four
Shots from the Malicious Wild West - Sample Three
Shots from the Malicious Wild West - Sample Two
Shots from the Malicious Wild West - Sample One
Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

The Revenge of the Waitress

0
May 30, 2007
Think your scrooge tips will achieve their effect? Think twice but don't put the emphasis on underpaid waitresses, rather on the overall availability of credit card data reading devices as well as their vulnerability to such readers. Here's a video of another waitress clonning credit cards on the fly :

"A telltale clue that helped the restaurant and investigators zero in on the waitress: She would make quick visits to the restroom after picking up customers' charge cards, apparently to swipe them through a palm-sized device that recorded the confidential numbers." Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Reverse Engineering the ANI Vulnerability

0
May 30, 2007
Informative video analyzing the ANI cursor vulnerability, part of the Google TechTalks series.

"Alex Sotirov is a vulnerability engineer at determina. He will discuss some latest techniques in reverse engineering software to find vulnerabilities. Particularly, he'll discuss his technique that lead him to find the ANI bug (a critical new bug in WinXP and Vista)."


Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Phrack Magazine's Latest Issue

0
May 29, 2007
Phrack is back believe it or not with its latest Issue 64 released two days ago. The style is still so old-school, so authentic it makes you remember extraordinary Web 1.0 experiences. Articles of notice I went through so far : "A brief history of the Underground scene" ; "Blind TCP/IP hijacking is still alive" ; and "The art of Exploitation: come back on an exploit". Dazzling already :

"In the last decade, Phrack took a very annoying industry-oriented editorial policy and the original spirit was in our opinion not respected. The good old school spirit as we like had somehow disappeared from the process of creating the magazine. That is why the underground got split with a major dispute, as some part of the scene was unhappy with this new way of publishing. We clearly needed to bring together again all the relevant parties around the spirit of hacking and the values that make the Underground. The Underground is neither about making the industry richer by publishing exploits or 0day information, nor distributing hacklogs of whitehats on the Internet, but to go further the limits of technology ever and ever, in a big wave of learning and sharing with the people ready to embrace it. This is not our war to fight peoples doing this for money but we have to clearly show our difference." Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Google Hacking for Vulnerabilities

0
May 29, 2007
Tools like these are a clear indication in the interest of gathering targets through google hacking techniques and SQL injecting them using a single tool. What’s important to note is that, instead of scanning the target's web server in an automated fashion thus, increasing the potential of detecting your malicious requests in this case the attack vectors are already known even cached on a search engines' servers. Perhaps a good time to set up a google hacking or PHP deception honeypot, make sure google crawls it and either gather first hand statistics, or deceive at your best. A paper released under the Know Your Enemy series comments on the concept of search engines' reconnaissance :

"Below we give the exploits we have seen against our honeypots and where possible an estimate of the number of users for each piece of software. The estimates are obtained by checking the number of Google search results returned for a given page in a website, for example searching for '"powered by PHPBB" inurl:viewtopic.php' suggests there are around 1.5 million installations of PHPBB indexed by Google."

Malware using search engines to build its hit lists is nothing new and it's the Santy worm and perhaps even the JS/Yamanner worm I have in mind. Worms like these are just the tip of the iceberg when it comes to malware because their successful intrusions act as a propagation vector for malware exes, exploits embedded pages, and hosting of phishing sites. In case you remember, over an year ago New Zealand started a nation wide google hacking security audit aiming to not just build awareness on the potential security issues, but to also, measure the country's susceptibility to google hacking which they claim is the highest in the world. If you don’t take care of your web application vulnerabilities someone else will, and your organization wouldn’t even have "the privilege" of getting exploited by an advanced attacker, but by a script kiddie making your server open a reverse shell back to them in between everything else. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Microsoft's Forefront Ad Campaign

0
May 23, 2007
The introduction of Microsoft's Forefront security solutions is already backed up by a huge ad campaign that can be seen on the majority of tech-news portals. The campaign is however lacking a consistent vision to communicate the benefits and main differentiation points -- if any -- of the product, and is barely informing that it exists in a not so creative way :

There's nothing in Forefront that really makes it notably better or worse than any other solutions that are already in the marketplace. However, the Microsoft name may be sufficient for it to steal market share, and a better integration with other Microsoft solutions…is likely to be a bit of a differentiator,” said Quin. Faced with increasing competition from Microsoft, Symantec Corp. questioned Microsoft's ability to effectively protect enterprise customers.

Trying to be witty too much while fighting ninjas and aliens often results in your ad campaign "clowning" in the eyes of a prospective customer. Security is indeed a cosmic phenomenon for Microsoft, an unexplained pseudo-randomly generated event that's continuing to be researched and analyzed for generations to come. Can they achieve desirable results? Will penetration pricing help? And will the ad agency that got commisioned with the ad campaign come up with a bit of a more creative psychological imagination the next time?

A pure example of an acquisition-to-solution strategy compared to AOLs licensing of a reputable AV vendor's technology, in order for them to enter the market segment as well. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Jihadists' Anonymous Internet Surfing Preferences

0
May 23, 2007
Jihadists are logically not just interested in encryption and steganography but also, in ways to anonymize their web surfing activities as much as possible. A wannabe jihadist whose tips and recommendations have gained him a lot of reputation around the forums I follow, recently came up with an in-depth article on recommended and reviewed IP cloaking services with direct download links in between. It makes stats like these questionable to a certain extend as I've already pointed out. Among the IP cloaking tools reviewed are :
- Steganos Internet Anonym Pro
- Hide IP Platinum 3.1
- Proxy Switcher Pro
- Invisible Browsing v5.0.52

TOR is, of course, mentioned as well but at the bottom of the article citing performance issues compared to commercial solutions. IP decloaking is not even considered as a concept. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

Counter Espionage Tips from the Cold War

0
May 23, 2007
There's nothing old-fashioned in short films like these representing possible techniques used by intelligence services while recruiting - "Cold War counter-spy instructional film created to convince government officials traveling with top secret info to watch their backs. Watch hapless G-men get seduced and setup for blackmail by treacherous Soviet she-spies"



And despite that today's perception of sexy she-spies has evolved proportionally with the technological advances in espionage, some of the tips are still emphasizing on the basics. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

A Client Application for "Secure" E-banking?

0
May 22, 2007
This is perhaps the second product concept myopia right after the lie detection software for text comminations I come across to recently. Remember a previous post heading in the opposite direction, where a bank was trying to rebuild confidence in the most abused phishing medium - the email - to keep in touch with its customers? Here's another company that's betting on a third-party client application to solve the problem of secure E-banking totally falling victim in the secure channel communication myopia one that I think has nothing to do with reality when it comes to the success of phishing :

"Here’s how Armored Online works: A company, such as a financial institution or online retailer, offers a downloadable client to customers through its website. That client then gives the customer’s computer a secure channel with which to communicate and transact with the company. Its Java-based browser is locked down, meaning it won’t accept any plug-ins, like cookies used by criminals. What’s more, the client can only “talk” to the server at the bank or online store. “It’s like iTunes for banks,” Mr. Sowerby said."

The attack of the disabled cookies? Not really, so be realistic. Coming up with a third-party application as the cornerstone of E-banking security directly conflicts with E-banking's biggest benefit - flexibility due to the compatibility with the most popular browsers. So you'd rather focus on the current situation - Brandjacking instead of re-inventing the SSL wheel -- as a matter of fact the Gozi trojan and the Nuclear Grabber are quite comfortable with SSL as they bypass it entirely. Even worse, a trojanized copy of the program will emerge given it receives any acceptance at all. And if banks start embracing it -- don't -- we can easily start talking about DRM enabled E-banking where, both, banks and customers will turn into virtual hostages to a third-party application trying to reboot the market for anti-phishing services, totally forgetting the problem is not in the lack of unencrypted transactions as no one is sniffing the credentials, but pushing fake sites instead of letting customers pull the sites for themselves.

Don't disrupt in irrelevance. Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

A Malware Loader For Sale

0
May 22, 2007
Continuing the Shots from the Malicious Wild West series and the yet another malware tool in the wild posts, here’s a recently advertised malware loader. Polymorphism, built in packing functions and the ability to set an interval for loading yet another executable at a URL or a URL redirector, DIY firewalls unloading techniques, pretty much anything ugly is in place -- as usual. The loader's source code is currently available for $150, undetected bots go for $15 per piece. Malware on demand in principle, or malicious economies of scale? Continue reading →
Email ThisBlogThis!Share to XShare to Facebook

MySpace's Sex Offenders Problem

0
May 21, 2007
MySpace, being one of the most popular social networking sites is always under fire on its efforts to combat known child offenders registering and using its database to find what they're looking for. The problem isn’t MySpace as a faciliator for such type of communications but the vast amounts of personal information -- future contact points -- kids publish about themselves online, not knowing that on the Internet anyone can be a dog and most importantly, parents loosing the emotional connection with their kids and making it easier for someone to break the ice and establish trust.

Several months ago, funded by nothing more but his common sense Kevin Poulsen gathered name data from the U.S public child offenders registry and found positive results with people -- thankfully -- stupid enough to use their real names. And while they wouldn't do it again the next time instead of making it easier to aggregate the data, a CAPTCHA to limit such automatic activities was implemented. Don't blame MySpace blame bureaucracy. Meanwhile, here's an article on U.S authorities demanding that MySpace provide data on identified and removed known child offenders -- they agreed :

"MySpace agreed Monday to provide the information to all states after some members of the group filed subpoenas or took other legal actions to demand it. The company said last week such efforts were required under the federal Electronic Communications Privacy Act before it could legally release the data."Different states are going about it different ways," said Noelle Talley, spokeswoman for Cooper, who filed a "civil investigative demand" for the information. Connecticut Attorney General Richard Blumenthal used a subpoena that "compels this information right away - within hours, not weeks, without delay - because it is vital to protecting children," he said."

If protecting children is vital, remove the CAPTCHA so everyone knowing how to aggregate and tweak the data will come up with far more sophisticated stats than the ones currently available. Actual results too. Next time it would become harder to track them, so don’t count on measures like these instead, ensure naughty conversations aren’t taking place at all. Makes me wonder one thing - should you be filtering known child offenders on the Internet perhaps a futile attempt given the pseudo-personalities they could establish, or at the ISP level and put them under surveillance right from the very beginning? Of course child offenders should not have unmonitored access to the Internet so rethink the basics.

Related posts:
Registered Sex Offenders on MySpace
IMSafer Now MySpace Compatible
Continue reading →
Email ThisBlogThis!Share to XShare to Facebook
  • Newer Posts
  • Older Posts
Subscribe to: Comments (Atom)

RSS Feed

  • RSS

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile

Blog Archive

  • ▼  2026 (3)
    • ▼  January (3)
      • ▼  Jan 05 (2)
        • A Leak of Silent Ransomware Operators
        • Profiling the Craxs Rat Malware-as-a-Service (MaaS...
      • ►  Jan 04 (1)
  • ►  2025 (34)
    • ►  December (1)
      • ►  Dec 26 (1)
    • ►  November (1)
      • ►  Nov 14 (1)
    • ►  September (6)
      • ►  Sep 30 (3)
      • ►  Sep 22 (1)
      • ►  Sep 20 (2)
    • ►  July (3)
      • ►  Jul 16 (1)
      • ►  Jul 05 (2)
    • ►  June (1)
      • ►  Jun 11 (1)
    • ►  May (7)
      • ►  May 20 (1)
      • ►  May 14 (1)
      • ►  May 09 (1)
      • ►  May 08 (2)
      • ►  May 07 (2)
    • ►  February (5)
      • ►  Feb 26 (1)
      • ►  Feb 25 (1)
      • ►  Feb 22 (2)
      • ►  Feb 21 (1)
    • ►  January (10)
      • ►  Jan 17 (3)
      • ►  Jan 16 (5)
      • ►  Jan 01 (2)
  • ►  2024 (100)
    • ►  December (5)
      • ►  Dec 30 (2)
      • ►  Dec 28 (1)
      • ►  Dec 07 (1)
      • ►  Dec 06 (1)
    • ►  November (5)
      • ►  Nov 22 (1)
      • ►  Nov 16 (1)
      • ►  Nov 07 (3)
    • ►  October (7)
      • ►  Oct 19 (1)
      • ►  Oct 15 (6)
    • ►  September (16)
      • ►  Sep 21 (3)
      • ►  Sep 18 (3)
      • ►  Sep 17 (1)
      • ►  Sep 16 (3)
      • ►  Sep 15 (4)
      • ►  Sep 12 (2)
    • ►  August (6)
      • ►  Aug 17 (2)
      • ►  Aug 13 (1)
      • ►  Aug 12 (1)
      • ►  Aug 11 (1)
      • ►  Aug 10 (1)
    • ►  July (11)
      • ►  Jul 30 (1)
      • ►  Jul 29 (3)
      • ►  Jul 28 (2)
      • ►  Jul 23 (1)
      • ►  Jul 12 (1)
      • ►  Jul 05 (2)
      • ►  Jul 03 (1)
    • ►  June (11)
      • ►  Jun 27 (1)
      • ►  Jun 13 (10)
    • ►  May (1)
      • ►  May 10 (1)
    • ►  April (8)
      • ►  Apr 26 (1)
      • ►  Apr 05 (1)
      • ►  Apr 04 (5)
      • ►  Apr 01 (1)
    • ►  March (3)
      • ►  Mar 15 (1)
      • ►  Mar 04 (1)
      • ►  Mar 01 (1)
    • ►  February (15)
      • ►  Feb 29 (2)
      • ►  Feb 28 (1)
      • ►  Feb 26 (3)
      • ►  Feb 24 (1)
      • ►  Feb 22 (2)
      • ►  Feb 21 (1)
      • ►  Feb 20 (1)
      • ►  Feb 19 (1)
      • ►  Feb 11 (3)
    • ►  January (12)
      • ►  Jan 20 (1)
      • ►  Jan 19 (1)
      • ►  Jan 18 (1)
      • ►  Jan 16 (1)
      • ►  Jan 15 (1)
      • ►  Jan 13 (1)
      • ►  Jan 12 (2)
      • ►  Jan 10 (1)
      • ►  Jan 07 (2)
      • ►  Jan 03 (1)
  • ►  2023 (160)
    • ►  December (15)
      • ►  Dec 28 (1)
      • ►  Dec 15 (4)
      • ►  Dec 02 (3)
      • ►  Dec 01 (7)
    • ►  November (24)
      • ►  Nov 27 (1)
      • ►  Nov 24 (20)
      • ►  Nov 16 (1)
      • ►  Nov 14 (1)
      • ►  Nov 09 (1)
    • ►  October (9)
      • ►  Oct 22 (1)
      • ►  Oct 16 (1)
      • ►  Oct 13 (1)
      • ►  Oct 07 (1)
      • ►  Oct 03 (5)
    • ►  September (25)
      • ►  Sep 29 (1)
      • ►  Sep 27 (2)
      • ►  Sep 26 (4)
      • ►  Sep 21 (1)
      • ►  Sep 20 (1)
      • ►  Sep 18 (8)
      • ►  Sep 17 (3)
      • ►  Sep 11 (1)
      • ►  Sep 09 (1)
      • ►  Sep 08 (1)
      • ►  Sep 04 (2)
    • ►  August (16)
      • ►  Aug 30 (1)
      • ►  Aug 27 (1)
      • ►  Aug 24 (1)
      • ►  Aug 22 (1)
      • ►  Aug 21 (3)
      • ►  Aug 20 (5)
      • ►  Aug 13 (1)
      • ►  Aug 11 (3)
    • ►  July (5)
      • ►  Jul 31 (1)
      • ►  Jul 27 (1)
      • ►  Jul 25 (1)
      • ►  Jul 20 (1)
      • ►  Jul 07 (1)
    • ►  June (8)
      • ►  Jun 05 (3)
      • ►  Jun 04 (2)
      • ►  Jun 02 (3)
    • ►  May (7)
      • ►  May 20 (2)
      • ►  May 08 (1)
      • ►  May 07 (1)
      • ►  May 03 (1)
      • ►  May 02 (1)
      • ►  May 01 (1)
    • ►  April (16)
      • ►  Apr 28 (4)
      • ►  Apr 27 (3)
      • ►  Apr 24 (3)
      • ►  Apr 13 (1)
      • ►  Apr 10 (2)
      • ►  Apr 06 (2)
      • ►  Apr 01 (1)
    • ►  March (14)
      • ►  Mar 31 (1)
      • ►  Mar 24 (1)
      • ►  Mar 19 (1)
      • ►  Mar 18 (8)
      • ►  Mar 07 (1)
      • ►  Mar 04 (1)
      • ►  Mar 03 (1)
    • ►  February (17)
      • ►  Feb 21 (1)
      • ►  Feb 14 (1)
      • ►  Feb 13 (2)
      • ►  Feb 09 (1)
      • ►  Feb 07 (1)
      • ►  Feb 06 (11)
    • ►  January (4)
      • ►  Jan 26 (3)
      • ►  Jan 17 (1)
  • ►  2022 (252)
    • ►  December (14)
      • ►  Dec 28 (1)
      • ►  Dec 27 (1)
      • ►  Dec 21 (2)
      • ►  Dec 20 (1)
      • ►  Dec 19 (1)
      • ►  Dec 17 (1)
      • ►  Dec 12 (1)
      • ►  Dec 11 (2)
      • ►  Dec 08 (1)
      • ►  Dec 06 (1)
      • ►  Dec 05 (1)
      • ►  Dec 04 (1)
    • ►  November (54)
      • ►  Nov 29 (1)
      • ►  Nov 16 (2)
      • ►  Nov 15 (2)
      • ►  Nov 03 (9)
      • ►  Nov 02 (39)
      • ►  Nov 01 (1)
    • ►  October (45)
      • ►  Oct 31 (10)
      • ►  Oct 29 (3)
      • ►  Oct 28 (3)
      • ►  Oct 27 (4)
      • ►  Oct 26 (15)
      • ►  Oct 25 (5)
      • ►  Oct 22 (1)
      • ►  Oct 21 (1)
      • ►  Oct 18 (1)
      • ►  Oct 12 (1)
      • ►  Oct 04 (1)
    • ►  September (3)
      • ►  Sep 23 (1)
      • ►  Sep 21 (1)
      • ►  Sep 20 (1)
    • ►  August (24)
      • ►  Aug 27 (2)
      • ►  Aug 18 (3)
      • ►  Aug 09 (10)
      • ►  Aug 06 (3)
      • ►  Aug 02 (6)
    • ►  July (17)
      • ►  Jul 30 (1)
      • ►  Jul 29 (1)
      • ►  Jul 26 (1)
      • ►  Jul 25 (1)
      • ►  Jul 08 (10)
      • ►  Jul 06 (1)
      • ►  Jul 01 (2)
    • ►  June (28)
      • ►  Jun 29 (1)
      • ►  Jun 28 (3)
      • ►  Jun 27 (6)
      • ►  Jun 26 (1)
      • ►  Jun 24 (1)
      • ►  Jun 23 (3)
      • ►  Jun 22 (1)
      • ►  Jun 21 (4)
      • ►  Jun 19 (1)
      • ►  Jun 14 (7)
    • ►  May (1)
      • ►  May 27 (1)
    • ►  April (3)
      • ►  Apr 24 (1)
      • ►  Apr 13 (2)
    • ►  March (11)
      • ►  Mar 30 (3)
      • ►  Mar 29 (1)
      • ►  Mar 28 (1)
      • ►  Mar 24 (3)
      • ►  Mar 20 (1)
      • ►  Mar 08 (1)
      • ►  Mar 04 (1)
    • ►  February (15)
      • ►  Feb 28 (2)
      • ►  Feb 27 (3)
      • ►  Feb 26 (1)
      • ►  Feb 25 (1)
      • ►  Feb 21 (1)
      • ►  Feb 17 (1)
      • ►  Feb 12 (1)
      • ►  Feb 05 (2)
      • ►  Feb 03 (1)
      • ►  Feb 02 (1)
      • ►  Feb 01 (1)
    • ►  January (37)
      • ►  Jan 28 (12)
      • ►  Jan 27 (11)
      • ►  Jan 26 (1)
      • ►  Jan 25 (1)
      • ►  Jan 24 (3)
      • ►  Jan 23 (3)
      • ►  Jan 22 (1)
      • ►  Jan 20 (5)
  • ►  2021 (196)
    • ►  December (17)
      • ►  Dec 30 (1)
      • ►  Dec 28 (2)
      • ►  Dec 25 (1)
      • ►  Dec 21 (1)
      • ►  Dec 14 (2)
      • ►  Dec 10 (1)
      • ►  Dec 09 (2)
      • ►  Dec 04 (7)
    • ►  November (9)
      • ►  Nov 30 (2)
      • ►  Nov 29 (1)
      • ►  Nov 28 (2)
      • ►  Nov 27 (3)
      • ►  Nov 03 (1)
    • ►  October (28)
      • ►  Oct 30 (2)
      • ►  Oct 29 (6)
      • ►  Oct 18 (3)
      • ►  Oct 10 (1)
      • ►  Oct 08 (1)
      • ►  Oct 07 (1)
      • ►  Oct 06 (1)
      • ►  Oct 04 (5)
      • ►  Oct 03 (1)
      • ►  Oct 02 (7)
    • ►  September (27)
      • ►  Sep 30 (4)
      • ►  Sep 27 (1)
      • ►  Sep 25 (1)
      • ►  Sep 22 (2)
      • ►  Sep 20 (8)
      • ►  Sep 18 (1)
      • ►  Sep 16 (1)
      • ►  Sep 09 (1)
      • ►  Sep 08 (4)
      • ►  Sep 07 (4)
    • ►  August (2)
      • ►  Aug 18 (1)
      • ►  Aug 16 (1)
    • ►  July (19)
      • ►  Jul 31 (2)
      • ►  Jul 29 (1)
      • ►  Jul 27 (1)
      • ►  Jul 22 (8)
      • ►  Jul 12 (1)
      • ►  Jul 11 (2)
      • ►  Jul 09 (1)
      • ►  Jul 06 (1)
      • ►  Jul 05 (2)
    • ►  June (12)
      • ►  Jun 25 (4)
      • ►  Jun 24 (3)
      • ►  Jun 14 (1)
      • ►  Jun 13 (3)
      • ►  Jun 09 (1)
    • ►  May (11)
      • ►  May 31 (2)
      • ►  May 29 (1)
      • ►  May 28 (1)
      • ►  May 25 (3)
      • ►  May 24 (2)
      • ►  May 04 (1)
      • ►  May 01 (1)
    • ►  April (23)
      • ►  Apr 30 (2)
      • ►  Apr 29 (3)
      • ►  Apr 28 (3)
      • ►  Apr 27 (3)
      • ►  Apr 25 (2)
      • ►  Apr 21 (1)
      • ►  Apr 19 (1)
      • ►  Apr 14 (3)
      • ►  Apr 07 (3)
      • ►  Apr 06 (2)
    • ►  March (24)
      • ►  Mar 31 (3)
      • ►  Mar 30 (3)
      • ►  Mar 29 (2)
      • ►  Mar 27 (1)
      • ►  Mar 26 (1)
      • ►  Mar 25 (1)
      • ►  Mar 22 (1)
      • ►  Mar 20 (4)
      • ►  Mar 19 (1)
      • ►  Mar 10 (1)
      • ►  Mar 08 (1)
      • ►  Mar 06 (2)
      • ►  Mar 03 (3)
    • ►  February (15)
      • ►  Feb 28 (2)
      • ►  Feb 25 (1)
      • ►  Feb 22 (2)
      • ►  Feb 20 (2)
      • ►  Feb 18 (1)
      • ►  Feb 16 (3)
      • ►  Feb 05 (4)
    • ►  January (9)
      • ►  Jan 14 (3)
      • ►  Jan 13 (1)
      • ►  Jan 12 (2)
      • ►  Jan 06 (1)
      • ►  Jan 01 (2)
  • ►  2020 (56)
    • ►  December (35)
      • ►  Dec 27 (1)
      • ►  Dec 14 (1)
      • ►  Dec 13 (3)
      • ►  Dec 12 (11)
      • ►  Dec 10 (2)
      • ►  Dec 06 (2)
      • ►  Dec 05 (3)
      • ►  Dec 02 (1)
      • ►  Dec 01 (11)
    • ►  November (1)
      • ►  Nov 08 (1)
    • ►  October (1)
      • ►  Oct 29 (1)
    • ►  September (4)
      • ►  Sep 11 (2)
      • ►  Sep 04 (1)
      • ►  Sep 01 (1)
    • ►  August (3)
      • ►  Aug 28 (3)
    • ►  July (5)
      • ►  Jul 17 (3)
      • ►  Jul 13 (1)
      • ►  Jul 12 (1)
    • ►  June (2)
      • ►  Jun 19 (1)
      • ►  Jun 18 (1)
    • ►  May (2)
      • ►  May 21 (2)
    • ►  February (1)
      • ►  Feb 03 (1)
    • ►  January (2)
      • ►  Jan 27 (1)
      • ►  Jan 08 (1)
  • ►  2019 (68)
    • ►  December (9)
      • ►  Dec 27 (1)
      • ►  Dec 23 (1)
      • ►  Dec 12 (2)
      • ►  Dec 04 (1)
      • ►  Dec 02 (4)
    • ►  November (3)
      • ►  Nov 02 (3)
    • ►  October (1)
      • ►  Oct 16 (1)
    • ►  September (11)
      • ►  Sep 20 (4)
      • ►  Sep 17 (1)
      • ►  Sep 11 (2)
      • ►  Sep 10 (1)
      • ►  Sep 09 (2)
      • ►  Sep 07 (1)
    • ►  August (2)
      • ►  Aug 19 (1)
      • ►  Aug 02 (1)
    • ►  July (6)
      • ►  Jul 29 (3)
      • ►  Jul 28 (1)
      • ►  Jul 27 (1)
      • ►  Jul 02 (1)
    • ►  May (16)
      • ►  May 30 (2)
      • ►  May 29 (2)
      • ►  May 28 (2)
      • ►  May 23 (1)
      • ►  May 15 (1)
      • ►  May 05 (4)
      • ►  May 04 (4)
    • ►  April (3)
      • ►  Apr 22 (1)
      • ►  Apr 12 (1)
      • ►  Apr 04 (1)
    • ►  March (1)
      • ►  Mar 22 (1)
    • ►  February (11)
      • ►  Feb 07 (9)
      • ►  Feb 06 (1)
      • ►  Feb 03 (1)
    • ►  January (5)
      • ►  Jan 31 (1)
      • ►  Jan 27 (1)
      • ►  Jan 24 (1)
      • ►  Jan 16 (1)
      • ►  Jan 15 (1)
  • ►  2018 (41)
    • ►  December (3)
      • ►  Dec 18 (1)
      • ►  Dec 17 (1)
      • ►  Dec 16 (1)
    • ►  November (2)
      • ►  Nov 28 (2)
    • ►  October (25)
      • ►  Oct 22 (6)
      • ►  Oct 21 (9)
      • ►  Oct 20 (8)
      • ►  Oct 19 (2)
    • ►  September (1)
      • ►  Sep 20 (1)
    • ►  August (2)
      • ►  Aug 12 (1)
      • ►  Aug 02 (1)
    • ►  July (3)
      • ►  Jul 30 (1)
      • ►  Jul 28 (1)
      • ►  Jul 24 (1)
    • ►  May (3)
      • ►  May 24 (1)
      • ►  May 22 (1)
      • ►  May 14 (1)
    • ►  January (2)
      • ►  Jan 23 (1)
      • ►  Jan 20 (1)
  • ►  2017 (16)
    • ►  November (3)
      • ►  Nov 15 (2)
      • ►  Nov 09 (1)
    • ►  July (1)
      • ►  Jul 28 (1)
    • ►  May (10)
      • ►  May 29 (10)
    • ►  January (2)
      • ►  Jan 05 (2)
  • ►  2016 (46)
    • ►  December (12)
      • ►  Dec 25 (4)
      • ►  Dec 24 (3)
      • ►  Dec 23 (4)
      • ►  Dec 21 (1)
    • ►  September (4)
      • ►  Sep 24 (1)
      • ►  Sep 23 (2)
      • ►  Sep 06 (1)
    • ►  August (9)
      • ►  Aug 29 (1)
      • ►  Aug 28 (2)
      • ►  Aug 19 (1)
      • ►  Aug 17 (3)
      • ►  Aug 16 (2)
    • ►  June (3)
      • ►  Jun 21 (1)
      • ►  Jun 20 (1)
      • ►  Jun 09 (1)
    • ►  May (13)
      • ►  May 30 (3)
      • ►  May 17 (3)
      • ►  May 16 (5)
      • ►  May 15 (1)
      • ►  May 07 (1)
    • ►  April (5)
      • ►  Apr 26 (2)
      • ►  Apr 24 (3)
  • ►  2015 (3)
    • ►  August (2)
      • ►  Aug 28 (1)
      • ►  Aug 27 (1)
    • ►  July (1)
      • ►  Jul 29 (1)
  • ►  2014 (11)
    • ►  October (1)
      • ►  Oct 21 (1)
    • ►  March (3)
      • ►  Mar 22 (1)
      • ►  Mar 06 (2)
    • ►  January (7)
      • ►  Jan 16 (2)
      • ►  Jan 09 (2)
      • ►  Jan 07 (2)
      • ►  Jan 06 (1)
  • ►  2013 (77)
    • ►  December (5)
      • ►  Dec 11 (2)
      • ►  Dec 04 (2)
      • ►  Dec 03 (1)
    • ►  November (12)
      • ►  Nov 14 (2)
      • ►  Nov 12 (4)
      • ►  Nov 04 (5)
      • ►  Nov 01 (1)
    • ►  October (3)
      • ►  Oct 02 (1)
      • ►  Oct 01 (2)
    • ►  September (5)
      • ►  Sep 28 (2)
      • ►  Sep 18 (2)
      • ►  Sep 16 (1)
    • ►  August (13)
      • ►  Aug 30 (1)
      • ►  Aug 29 (4)
      • ►  Aug 23 (1)
      • ►  Aug 22 (2)
      • ►  Aug 21 (1)
      • ►  Aug 15 (1)
      • ►  Aug 10 (2)
      • ►  Aug 01 (1)
    • ►  July (7)
      • ►  Jul 23 (2)
      • ►  Jul 19 (2)
      • ►  Jul 04 (3)
    • ►  June (7)
      • ►  Jun 22 (2)
      • ►  Jun 20 (1)
      • ►  Jun 12 (1)
      • ►  Jun 10 (2)
      • ►  Jun 04 (1)
    • ►  May (5)
      • ►  May 25 (2)
      • ►  May 24 (2)
      • ►  May 01 (1)
    • ►  April (5)
      • ►  Apr 17 (2)
      • ►  Apr 10 (2)
      • ►  Apr 01 (1)
    • ►  March (3)
      • ►  Mar 06 (2)
      • ►  Mar 04 (1)
    • ►  February (6)
      • ►  Feb 21 (2)
      • ►  Feb 06 (2)
      • ►  Feb 04 (2)
    • ►  January (6)
      • ►  Jan 09 (1)
      • ►  Jan 07 (2)
      • ►  Jan 05 (3)
  • ►  2012 (38)
    • ►  December (2)
      • ►  Dec 27 (1)
      • ►  Dec 13 (1)
    • ►  November (7)
      • ►  Nov 30 (2)
      • ►  Nov 26 (2)
      • ►  Nov 23 (1)
      • ►  Nov 02 (2)
    • ►  October (3)
      • ►  Oct 26 (2)
      • ►  Oct 01 (1)
    • ►  September (4)
      • ►  Sep 28 (4)
    • ►  August (2)
      • ►  Aug 23 (2)
    • ►  July (2)
      • ►  Jul 10 (2)
    • ►  June (2)
      • ►  Jun 06 (2)
    • ►  May (4)
      • ►  May 08 (4)
    • ►  April (2)
      • ►  Apr 09 (2)
    • ►  March (2)
      • ►  Mar 07 (2)
    • ►  February (2)
      • ►  Feb 02 (1)
      • ►  Feb 01 (1)
    • ►  January (6)
      • ►  Jan 09 (2)
      • ►  Jan 03 (2)
      • ►  Jan 01 (2)
  • ►  2011 (59)
    • ►  December (1)
      • ►  Dec 04 (1)
    • ►  October (8)
      • ►  Oct 31 (2)
      • ►  Oct 20 (2)
      • ►  Oct 18 (1)
      • ►  Oct 09 (1)
      • ►  Oct 04 (2)
    • ►  September (4)
      • ►  Sep 28 (2)
      • ►  Sep 27 (1)
      • ►  Sep 11 (1)
    • ►  August (4)
      • ►  Aug 29 (3)
      • ►  Aug 22 (1)
    • ►  July (3)
      • ►  Jul 07 (3)
    • ►  June (1)
      • ►  Jun 08 (1)
    • ►  May (10)
      • ►  May 30 (2)
      • ►  May 26 (2)
      • ►  May 25 (2)
      • ►  May 10 (1)
      • ►  May 09 (3)
    • ►  April (5)
      • ►  Apr 28 (1)
      • ►  Apr 12 (1)
      • ►  Apr 11 (1)
      • ►  Apr 04 (2)
    • ►  March (12)
      • ►  Mar 31 (2)
      • ►  Mar 25 (1)
      • ►  Mar 23 (1)
      • ►  Mar 16 (2)
      • ►  Mar 11 (1)
      • ►  Mar 10 (4)
      • ►  Mar 07 (1)
    • ►  February (6)
      • ►  Feb 28 (1)
      • ►  Feb 21 (1)
      • ►  Feb 16 (1)
      • ►  Feb 15 (1)
      • ►  Feb 14 (1)
      • ►  Feb 09 (1)
    • ►  January (5)
      • ►  Jan 31 (2)
      • ►  Jan 26 (1)
      • ►  Jan 22 (1)
      • ►  Jan 21 (1)
  • ►  2010 (90)
    • ►  September (2)
      • ►  Sep 11 (1)
      • ►  Sep 08 (1)
    • ►  August (3)
      • ►  Aug 13 (1)
      • ►  Aug 09 (1)
      • ►  Aug 02 (1)
    • ►  July (7)
      • ►  Jul 20 (1)
      • ►  Jul 19 (1)
      • ►  Jul 16 (1)
      • ►  Jul 15 (1)
      • ►  Jul 14 (1)
      • ►  Jul 13 (1)
      • ►  Jul 05 (1)
    • ►  June (7)
      • ►  Jun 29 (1)
      • ►  Jun 17 (1)
      • ►  Jun 16 (1)
      • ►  Jun 15 (1)
      • ►  Jun 08 (1)
      • ►  Jun 03 (2)
    • ►  May (16)
      • ►  May 31 (1)
      • ►  May 28 (1)
      • ►  May 26 (1)
      • ►  May 17 (2)
      • ►  May 13 (3)
      • ►  May 11 (4)
      • ►  May 08 (2)
      • ►  May 04 (2)
    • ►  April (15)
      • ►  Apr 29 (1)
      • ►  Apr 27 (4)
      • ►  Apr 20 (1)
      • ►  Apr 18 (2)
      • ►  Apr 16 (1)
      • ►  Apr 14 (1)
      • ►  Apr 12 (3)
      • ►  Apr 09 (1)
      • ►  Apr 01 (1)
    • ►  March (13)
      • ►  Mar 30 (2)
      • ►  Mar 29 (1)
      • ►  Mar 24 (1)
      • ►  Mar 23 (1)
      • ►  Mar 20 (2)
      • ►  Mar 15 (1)
      • ►  Mar 12 (1)
      • ►  Mar 11 (1)
      • ►  Mar 10 (1)
      • ►  Mar 09 (1)
      • ►  Mar 02 (1)
    • ►  February (17)
      • ►  Feb 25 (2)
      • ►  Feb 15 (2)
      • ►  Feb 12 (4)
      • ►  Feb 11 (1)
      • ►  Feb 09 (1)
      • ►  Feb 03 (4)
      • ►  Feb 02 (2)
      • ►  Feb 01 (1)
    • ►  January (10)
      • ►  Jan 26 (3)
      • ►  Jan 18 (1)
      • ►  Jan 13 (1)
      • ►  Jan 08 (2)
      • ►  Jan 04 (3)
  • ►  2009 (134)
    • ►  December (9)
      • ►  Dec 26 (2)
      • ►  Dec 22 (2)
      • ►  Dec 21 (1)
      • ►  Dec 07 (2)
      • ►  Dec 03 (1)
      • ►  Dec 02 (1)
    • ►  November (13)
      • ►  Nov 30 (1)
      • ►  Nov 25 (2)
      • ►  Nov 18 (1)
      • ►  Nov 17 (3)
      • ►  Nov 16 (2)
      • ►  Nov 11 (2)
      • ►  Nov 03 (1)
      • ►  Nov 02 (1)
    • ►  October (9)
      • ►  Oct 27 (1)
      • ►  Oct 21 (2)
      • ►  Oct 20 (1)
      • ►  Oct 14 (2)
      • ►  Oct 06 (2)
      • ►  Oct 01 (1)
    • ►  September (10)
      • ►  Sep 25 (2)
      • ►  Sep 18 (1)
      • ►  Sep 16 (2)
      • ►  Sep 14 (1)
      • ►  Sep 07 (1)
      • ►  Sep 03 (2)
      • ►  Sep 01 (1)
    • ►  August (12)
      • ►  Aug 24 (1)
      • ►  Aug 19 (2)
      • ►  Aug 18 (2)
      • ►  Aug 10 (1)
      • ►  Aug 06 (1)
      • ►  Aug 05 (1)
      • ►  Aug 04 (3)
      • ►  Aug 03 (1)
    • ►  July (14)
      • ►  Jul 30 (2)
      • ►  Jul 29 (1)
      • ►  Jul 27 (1)
      • ►  Jul 22 (2)
      • ►  Jul 16 (2)
      • ►  Jul 15 (1)
      • ►  Jul 08 (1)
      • ►  Jul 07 (2)
      • ►  Jul 03 (1)
      • ►  Jul 01 (1)
    • ►  June (11)
      • ►  Jun 25 (1)
      • ►  Jun 24 (1)
      • ►  Jun 17 (1)
      • ►  Jun 16 (1)
      • ►  Jun 09 (1)
      • ►  Jun 08 (2)
      • ►  Jun 05 (1)
      • ►  Jun 04 (1)
      • ►  Jun 02 (2)
    • ►  May (11)
      • ►  May 27 (1)
      • ►  May 26 (2)
      • ►  May 19 (2)
      • ►  May 14 (1)
      • ►  May 12 (1)
      • ►  May 06 (3)
      • ►  May 01 (1)
    • ►  April (11)
      • ►  Apr 30 (1)
      • ►  Apr 29 (1)
      • ►  Apr 28 (1)
      • ►  Apr 22 (1)
      • ►  Apr 16 (2)
      • ►  Apr 15 (1)
      • ►  Apr 14 (1)
      • ►  Apr 08 (2)
      • ►  Apr 01 (1)
    • ►  March (11)
      • ►  Mar 31 (2)
      • ►  Mar 26 (1)
      • ►  Mar 25 (1)
      • ►  Mar 19 (1)
      • ►  Mar 18 (1)
      • ►  Mar 12 (1)
      • ►  Mar 11 (1)
      • ►  Mar 09 (1)
      • ►  Mar 04 (2)
    • ►  February (12)
      • ►  Feb 26 (2)
      • ►  Feb 24 (1)
      • ►  Feb 23 (1)
      • ►  Feb 18 (1)
      • ►  Feb 17 (1)
      • ►  Feb 11 (1)
      • ►  Feb 05 (1)
      • ►  Feb 03 (2)
      • ►  Feb 02 (2)
    • ►  January (11)
      • ►  Jan 28 (1)
      • ►  Jan 27 (1)
      • ►  Jan 21 (1)
      • ►  Jan 19 (2)
      • ►  Jan 14 (2)
      • ►  Jan 07 (1)
      • ►  Jan 06 (3)
  • ►  2008 (267)
    • ►  December (10)
      • ►  Dec 17 (1)
      • ►  Dec 15 (3)
      • ►  Dec 11 (1)
      • ►  Dec 09 (1)
      • ►  Dec 08 (1)
      • ►  Dec 04 (1)
      • ►  Dec 02 (2)
    • ►  November (15)
      • ►  Nov 27 (1)
      • ►  Nov 25 (1)
      • ►  Nov 19 (2)
      • ►  Nov 18 (1)
      • ►  Nov 13 (2)
      • ►  Nov 12 (3)
      • ►  Nov 10 (1)
      • ►  Nov 06 (1)
      • ►  Nov 04 (1)
      • ►  Nov 03 (2)
    • ►  October (25)
      • ►  Oct 29 (1)
      • ►  Oct 28 (2)
      • ►  Oct 24 (1)
      • ►  Oct 22 (1)
      • ►  Oct 21 (1)
      • ►  Oct 20 (1)
      • ►  Oct 16 (2)
      • ►  Oct 15 (1)
      • ►  Oct 14 (2)
      • ►  Oct 09 (2)
      • ►  Oct 07 (3)
      • ►  Oct 06 (1)
      • ►  Oct 03 (2)
      • ►  Oct 02 (4)
      • ►  Oct 01 (1)
    • ►  September (17)
      • ►  Sep 30 (2)
      • ►  Sep 29 (2)
      • ►  Sep 26 (1)
      • ►  Sep 25 (1)
      • ►  Sep 24 (2)
      • ►  Sep 17 (1)
      • ►  Sep 16 (1)
      • ►  Sep 15 (2)
      • ►  Sep 10 (1)
      • ►  Sep 04 (1)
      • ►  Sep 03 (2)
      • ►  Sep 02 (1)
    • ►  August (26)
      • ►  Aug 29 (1)
      • ►  Aug 28 (1)
      • ►  Aug 27 (1)
      • ►  Aug 26 (2)
      • ►  Aug 25 (1)
      • ►  Aug 22 (1)
      • ►  Aug 21 (1)
      • ►  Aug 20 (2)
      • ►  Aug 19 (1)
      • ►  Aug 18 (2)
      • ►  Aug 14 (2)
      • ►  Aug 13 (1)
      • ►  Aug 11 (1)
      • ►  Aug 08 (2)
      • ►  Aug 07 (2)
      • ►  Aug 05 (3)
      • ►  Aug 04 (1)
      • ►  Aug 01 (1)
    • ►  July (38)
      • ►  Jul 31 (1)
      • ►  Jul 30 (1)
      • ►  Jul 29 (2)
      • ►  Jul 28 (2)
      • ►  Jul 25 (2)
      • ►  Jul 24 (3)
      • ►  Jul 22 (2)
      • ►  Jul 21 (2)
      • ►  Jul 18 (4)
      • ►  Jul 17 (2)
      • ►  Jul 15 (2)
      • ►  Jul 14 (2)
      • ►  Jul 11 (1)
      • ►  Jul 10 (1)
      • ►  Jul 09 (2)
      • ►  Jul 08 (1)
      • ►  Jul 07 (3)
      • ►  Jul 04 (1)
      • ►  Jul 03 (1)
      • ►  Jul 02 (1)
      • ►  Jul 01 (2)
    • ►  June (19)
      • ►  Jun 30 (1)
      • ►  Jun 27 (1)
      • ►  Jun 26 (1)
      • ►  Jun 25 (2)
      • ►  Jun 24 (1)
      • ►  Jun 23 (1)
      • ►  Jun 20 (2)
      • ►  Jun 18 (1)
      • ►  Jun 16 (1)
      • ►  Jun 13 (1)
      • ►  Jun 12 (1)
      • ►  Jun 11 (1)
      • ►  Jun 10 (1)
      • ►  Jun 09 (1)
      • ►  Jun 05 (1)
      • ►  Jun 03 (1)
      • ►  Jun 02 (1)
    • ►  May (33)
      • ►  May 30 (2)
      • ►  May 27 (2)
      • ►  May 26 (4)
      • ►  May 23 (1)
      • ►  May 22 (1)
      • ►  May 21 (2)
      • ►  May 20 (3)
      • ►  May 19 (2)
      • ►  May 17 (1)
      • ►  May 15 (2)
      • ►  May 14 (1)
      • ►  May 13 (1)
      • ►  May 12 (3)
      • ►  May 09 (1)
      • ►  May 08 (1)
      • ►  May 07 (2)
      • ►  May 06 (1)
      • ►  May 05 (1)
      • ►  May 02 (2)
    • ►  April (30)
      • ►  Apr 30 (3)
      • ►  Apr 29 (1)
      • ►  Apr 28 (2)
      • ►  Apr 27 (1)
      • ►  Apr 26 (1)
      • ►  Apr 24 (1)
      • ►  Apr 23 (2)
      • ►  Apr 22 (1)
      • ►  Apr 21 (4)
      • ►  Apr 18 (1)
      • ►  Apr 16 (2)
      • ►  Apr 15 (1)
      • ►  Apr 14 (2)
      • ►  Apr 08 (1)
      • ►  Apr 07 (1)
      • ►  Apr 03 (1)
      • ►  Apr 02 (1)
      • ►  Apr 01 (4)
    • ►  March (19)
      • ►  Mar 31 (2)
      • ►  Mar 28 (1)
      • ►  Mar 25 (1)
      • ►  Mar 20 (1)
      • ►  Mar 19 (1)
      • ►  Mar 18 (1)
      • ►  Mar 17 (1)
      • ►  Mar 12 (4)
      • ►  Mar 10 (1)
      • ►  Mar 07 (1)
      • ►  Mar 06 (1)
      • ►  Mar 05 (2)
      • ►  Mar 04 (1)
      • ►  Mar 03 (1)
    • ►  February (21)
      • ►  Feb 27 (2)
      • ►  Feb 26 (1)
      • ►  Feb 25 (1)
      • ►  Feb 22 (1)
      • ►  Feb 21 (2)
      • ►  Feb 20 (2)
      • ►  Feb 18 (5)
      • ►  Feb 13 (4)
      • ►  Feb 12 (2)
      • ►  Feb 11 (1)
    • ►  January (14)
      • ►  Jan 31 (1)
      • ►  Jan 28 (1)
      • ►  Jan 21 (2)
      • ►  Jan 17 (1)
      • ►  Jan 16 (1)
      • ►  Jan 15 (2)
      • ►  Jan 14 (2)
      • ►  Jan 10 (1)
      • ►  Jan 08 (1)
      • ►  Jan 07 (2)
  • ►  2007 (331)
    • ►  December (19)
      • ►  Dec 28 (2)
      • ►  Dec 24 (2)
      • ►  Dec 20 (2)
      • ►  Dec 19 (1)
      • ►  Dec 17 (1)
      • ►  Dec 16 (1)
      • ►  Dec 15 (1)
      • ►  Dec 12 (2)
      • ►  Dec 11 (1)
      • ►  Dec 10 (3)
      • ►  Dec 07 (1)
      • ►  Dec 05 (1)
      • ►  Dec 03 (1)
    • ►  November (33)
      • ►  Nov 29 (1)
      • ►  Nov 28 (2)
      • ►  Nov 27 (3)
      • ►  Nov 26 (2)
      • ►  Nov 23 (1)
      • ►  Nov 21 (2)
      • ►  Nov 20 (1)
      • ►  Nov 18 (2)
      • ►  Nov 16 (1)
      • ►  Nov 15 (2)
      • ►  Nov 14 (3)
      • ►  Nov 12 (3)
      • ►  Nov 09 (1)
      • ►  Nov 08 (1)
      • ►  Nov 07 (1)
      • ►  Nov 06 (1)
      • ►  Nov 05 (2)
      • ►  Nov 03 (2)
      • ►  Nov 02 (2)
    • ►  October (32)
      • ►  Oct 30 (2)
      • ►  Oct 29 (2)
      • ►  Oct 25 (1)
      • ►  Oct 23 (4)
      • ►  Oct 22 (1)
      • ►  Oct 21 (1)
      • ►  Oct 20 (1)
      • ►  Oct 19 (2)
      • ►  Oct 18 (1)
      • ►  Oct 17 (1)
      • ►  Oct 16 (3)
      • ►  Oct 15 (1)
      • ►  Oct 13 (1)
      • ►  Oct 11 (3)
      • ►  Oct 10 (2)
      • ►  Oct 08 (1)
      • ►  Oct 05 (1)
      • ►  Oct 03 (2)
      • ►  Oct 02 (1)
      • ►  Oct 01 (1)
    • ►  September (28)
      • ►  Sep 30 (2)
      • ►  Sep 29 (2)
      • ►  Sep 28 (1)
      • ►  Sep 27 (1)
      • ►  Sep 26 (3)
      • ►  Sep 24 (1)
      • ►  Sep 21 (1)
      • ►  Sep 20 (1)
      • ►  Sep 19 (2)
      • ►  Sep 17 (3)
      • ►  Sep 14 (1)
      • ►  Sep 12 (1)
      • ►  Sep 11 (1)
      • ►  Sep 10 (2)
      • ►  Sep 06 (1)
      • ►  Sep 05 (2)
      • ►  Sep 04 (2)
      • ►  Sep 03 (1)
    • ►  August (25)
      • ►  Aug 31 (2)
      • ►  Aug 30 (1)
      • ►  Aug 29 (2)
      • ►  Aug 28 (1)
      • ►  Aug 26 (1)
      • ►  Aug 25 (1)
      • ►  Aug 24 (2)
      • ►  Aug 22 (2)
      • ►  Aug 21 (1)
      • ►  Aug 20 (1)
      • ►  Aug 17 (1)
      • ►  Aug 16 (3)
      • ►  Aug 13 (2)
      • ►  Aug 09 (1)
      • ►  Aug 08 (2)
      • ►  Aug 03 (2)
    • ►  July (22)
      • ►  Jul 31 (3)
      • ►  Jul 30 (2)
      • ►  Jul 28 (2)
      • ►  Jul 26 (3)
      • ►  Jul 25 (1)
      • ►  Jul 19 (1)
      • ►  Jul 18 (2)
      • ►  Jul 17 (1)
      • ►  Jul 11 (2)
      • ►  Jul 09 (2)
      • ►  Jul 06 (1)
      • ►  Jul 05 (1)
      • ►  Jul 04 (1)
    • ►  June (20)
      • ►  Jun 29 (1)
      • ►  Jun 28 (1)
      • ►  Jun 27 (1)
      • ►  Jun 26 (1)
      • ►  Jun 25 (2)
      • ►  Jun 22 (2)
      • ►  Jun 21 (2)
      • ►  Jun 20 (1)
      • ►  Jun 18 (1)
      • ►  Jun 12 (3)
      • ►  Jun 07 (1)
      • ►  Jun 06 (2)
      • ►  Jun 04 (2)
    • ►  May (30)
      • ►  May 31 (1)
      • ►  May 30 (3)
      • ►  May 29 (2)
      • ►  May 23 (3)
      • ►  May 22 (2)
      • ►  May 21 (1)
      • ►  May 19 (1)
      • ►  May 18 (1)
      • ►  May 17 (1)
      • ►  May 16 (4)
      • ►  May 14 (2)
      • ►  May 11 (1)
      • ►  May 10 (3)
      • ►  May 08 (1)
      • ►  May 04 (2)
      • ►  May 02 (2)
    • ►  April (20)
      • ►  Apr 30 (3)
      • ►  Apr 26 (3)
      • ►  Apr 25 (1)
      • ►  Apr 23 (1)
      • ►  Apr 20 (4)
      • ►  Apr 12 (1)
      • ►  Apr 10 (2)
      • ►  Apr 09 (1)
      • ►  Apr 04 (3)
      • ►  Apr 01 (1)
    • ►  March (41)
      • ►  Mar 30 (2)
      • ►  Mar 28 (1)
      • ►  Mar 27 (2)
      • ►  Mar 22 (2)
      • ►  Mar 21 (3)
      • ►  Mar 20 (4)
      • ►  Mar 19 (5)
      • ►  Mar 14 (1)
      • ►  Mar 12 (3)
      • ►  Mar 11 (1)
      • ►  Mar 10 (5)
      • ►  Mar 09 (3)
      • ►  Mar 08 (3)
      • ►  Mar 07 (4)
      • ►  Mar 02 (1)
      • ►  Mar 01 (1)
    • ►  February (32)
      • ►  Feb 28 (2)
      • ►  Feb 27 (3)
      • ►  Feb 23 (3)
      • ►  Feb 22 (2)
      • ►  Feb 21 (1)
      • ►  Feb 19 (1)
      • ►  Feb 18 (3)
      • ►  Feb 16 (2)
      • ►  Feb 15 (2)
      • ►  Feb 14 (2)
      • ►  Feb 13 (3)
      • ►  Feb 12 (1)
      • ►  Feb 08 (2)
      • ►  Feb 06 (1)
      • ►  Feb 02 (1)
      • ►  Feb 01 (3)
    • ►  January (29)
      • ►  Jan 26 (2)
      • ►  Jan 25 (4)
      • ►  Jan 23 (2)
      • ►  Jan 17 (2)
      • ►  Jan 15 (1)
      • ►  Jan 13 (1)
      • ►  Jan 11 (2)
      • ►  Jan 10 (3)
      • ►  Jan 09 (3)
      • ►  Jan 08 (2)
      • ►  Jan 07 (5)
      • ►  Jan 04 (2)
  • ►  2006 (325)
    • ►  December (20)
      • ►  Dec 19 (2)
      • ►  Dec 18 (1)
      • ►  Dec 14 (3)
      • ►  Dec 12 (2)
      • ►  Dec 11 (2)
      • ►  Dec 10 (6)
      • ►  Dec 08 (2)
      • ►  Dec 07 (2)
    • ►  November (20)
      • ►  Nov 30 (2)
      • ►  Nov 29 (2)
      • ►  Nov 27 (4)
      • ►  Nov 20 (1)
      • ►  Nov 14 (3)
      • ►  Nov 13 (2)
      • ►  Nov 09 (2)
      • ►  Nov 07 (1)
      • ►  Nov 03 (1)
      • ►  Nov 01 (2)
    • ►  October (28)
      • ►  Oct 30 (1)
      • ►  Oct 29 (2)
      • ►  Oct 28 (1)
      • ►  Oct 26 (3)
      • ►  Oct 24 (3)
      • ►  Oct 18 (2)
      • ►  Oct 17 (1)
      • ►  Oct 16 (2)
      • ►  Oct 15 (1)
      • ►  Oct 14 (1)
      • ►  Oct 12 (7)
      • ►  Oct 05 (3)
      • ►  Oct 04 (1)
    • ►  September (40)
      • ►  Sep 28 (4)
      • ►  Sep 27 (2)
      • ►  Sep 25 (3)
      • ►  Sep 22 (4)
      • ►  Sep 19 (1)
      • ►  Sep 18 (4)
      • ►  Sep 14 (1)
      • ►  Sep 13 (5)
      • ►  Sep 12 (1)
      • ►  Sep 11 (3)
      • ►  Sep 08 (3)
      • ►  Sep 07 (1)
      • ►  Sep 06 (2)
      • ►  Sep 05 (1)
      • ►  Sep 04 (2)
      • ►  Sep 03 (1)
      • ►  Sep 02 (2)
    • ►  August (27)
      • ►  Aug 28 (1)
      • ►  Aug 27 (1)
      • ►  Aug 26 (4)
      • ►  Aug 22 (3)
      • ►  Aug 20 (1)
      • ►  Aug 19 (1)
      • ►  Aug 16 (1)
      • ►  Aug 12 (2)
      • ►  Aug 11 (1)
      • ►  Aug 10 (3)
      • ►  Aug 09 (2)
      • ►  Aug 07 (1)
      • ►  Aug 06 (1)
      • ►  Aug 05 (1)
      • ►  Aug 04 (1)
      • ►  Aug 03 (2)
      • ►  Aug 02 (1)
    • ►  July (28)
      • ►  Jul 31 (2)
      • ►  Jul 30 (1)
      • ►  Jul 27 (1)
      • ►  Jul 26 (1)
      • ►  Jul 25 (1)
      • ►  Jul 24 (1)
      • ►  Jul 21 (5)
      • ►  Jul 20 (1)
      • ►  Jul 17 (1)
      • ►  Jul 16 (3)
      • ►  Jul 14 (1)
      • ►  Jul 10 (2)
      • ►  Jul 09 (1)
      • ►  Jul 08 (1)
      • ►  Jul 06 (2)
      • ►  Jul 05 (1)
      • ►  Jul 03 (1)
      • ►  Jul 02 (1)
      • ►  Jul 01 (1)
    • ►  June (28)
      • ►  Jun 30 (2)
      • ►  Jun 29 (2)
      • ►  Jun 28 (1)
      • ►  Jun 27 (2)
      • ►  Jun 26 (3)
      • ►  Jun 25 (2)
      • ►  Jun 24 (1)
      • ►  Jun 13 (2)
      • ►  Jun 11 (2)
      • ►  Jun 10 (3)
      • ►  Jun 09 (1)
      • ►  Jun 08 (2)
      • ►  Jun 06 (2)
      • ►  Jun 04 (2)
      • ►  Jun 03 (1)
    • ►  May (33)
      • ►  May 31 (1)
      • ►  May 30 (4)
      • ►  May 28 (1)
      • ►  May 27 (4)
      • ►  May 23 (5)
      • ►  May 22 (1)
      • ►  May 16 (3)
      • ►  May 15 (1)
      • ►  May 12 (1)
      • ►  May 11 (5)
      • ►  May 09 (2)
      • ►  May 08 (1)
      • ►  May 04 (2)
      • ►  May 03 (1)
      • ►  May 02 (1)
    • ►  April (20)
      • ►  Apr 27 (2)
      • ►  Apr 26 (1)
      • ►  Apr 25 (1)
      • ►  Apr 24 (2)
      • ►  Apr 20 (2)
      • ►  Apr 18 (2)
      • ►  Apr 14 (1)
      • ►  Apr 13 (2)
      • ►  Apr 12 (2)
      • ►  Apr 05 (4)
      • ►  Apr 03 (1)
    • ►  March (19)
      • ►  Mar 31 (2)
      • ►  Mar 27 (2)
      • ►  Mar 21 (2)
      • ►  Mar 20 (1)
      • ►  Mar 17 (2)
      • ►  Mar 16 (1)
      • ►  Mar 15 (1)
      • ►  Mar 10 (1)
      • ►  Mar 07 (2)
      • ►  Mar 06 (5)
    • ►  February (23)
      • ►  Feb 27 (1)
      • ►  Feb 25 (1)
      • ►  Feb 24 (4)
      • ►  Feb 17 (3)
      • ►  Feb 16 (1)
      • ►  Feb 15 (2)
      • ►  Feb 14 (1)
      • ►  Feb 13 (1)
      • ►  Feb 09 (2)
      • ►  Feb 08 (1)
      • ►  Feb 07 (2)
      • ►  Feb 06 (1)
      • ►  Feb 03 (1)
      • ►  Feb 02 (2)
    • ►  January (39)
      • ►  Jan 31 (1)
      • ►  Jan 30 (3)
      • ►  Jan 26 (5)
      • ►  Jan 24 (1)
      • ►  Jan 23 (5)
      • ►  Jan 19 (2)
      • ►  Jan 17 (2)
      • ►  Jan 16 (3)
      • ►  Jan 12 (2)
      • ►  Jan 11 (1)
      • ►  Jan 10 (4)
      • ►  Jan 09 (1)
      • ►  Jan 04 (9)
  • ►  2005 (6)
    • ►  December (6)
      • ►  Dec 19 (3)
      • ►  Dec 14 (1)
      • ►  Dec 12 (1)
      • ►  Dec 07 (1)

Tags

  • 29A
  • 29A Virus Coding Group
  • 419 Scam
  • AbdAllah
  • Abdallah Internet Hizmetleri
  • Able Danger
  • Abuse Department
  • Active Security Monitor
  • Advance Fee Scam
  • Advanced Persistent Threat
  • Advertising
  • Adware
  • Affiliate Network
  • Ahmad Al Agha
  • Al Qaeda
  • Aleksandr Zhukov
  • Allied Group Inc
  • Amazon AWS
  • ANA Spoofer Project
  • Android
  • Anonymity
  • Anonymizer
  • Anonymous
  • Anonymous Hacking Collective
  • Anti-Phishing Group
  • Antivirus
  • Antivirus Signatures
  • Anton Nikolaevich Korotchenko
  • AOL
  • API
  • Apple
  • APT
  • Aqua ZeuS Gang
  • Armadillo Phone
  • Ashiyane Digital Security Team
  • ASProx
  • Astalavista
  • Astalavista Security Group
  • Astalavista.box.sk
  • ATM Skimmer
  • ATS
  • Australia
  • Authentication
  • Avalance Botnet
  • Avast
  • Background Check
  • BadB
  • Bahama Botnet
  • BakaSoftware
  • Bantu
  • BBC
  • Bebo
  • Bed Time Reading
  • Behrooz Kamalian
  • Best Practices
  • BGP
  • Big Brother
  • Bill Gates Botnet
  • Biography
  • Biometrics
  • Bitcoin
  • Bjorn Andreasson
  • Black Energy
  • Blackhat SEO
  • Blood and Honor
  • Blood and Honor Bulgaria
  • Boeing
  • Bogus Account
  • bother
  • Botners
  • Botnet
  • Botnets
  • Box.sk
  • Brian Krebs
  • Brute-Forcing
  • Bulgaria
  • Bulgaria Law Enforcement
  • Bulgarian Cyber Army
  • Bulgarian Cyber Army Hacking Group
  • Bullet Proof Hosting
  • Bust
  • C4I
  • CALEA
  • Caller ID
  • Caller ID Spoofer
  • Candid Wuest
  • CAPTCHA
  • Career Enrichment
  • Cash Transfers
  • CCTV
  • CDT
  • Cell Phone Monitoring
  • Cell Phone Surveillance
  • CellDEK
  • Censorship
  • Center for Democracy and Technology
  • CERT
  • Cheyenne Mountain Operations Center
  • China
  • China Eagle Union
  • CIA
  • CipherTrust
  • Classified Information
  • Client-Side Exploits
  • Client-Side Vulnerabilities
  • CNO
  • COCOM
  • Cold War
  • COMINT
  • Competitive Intelligence
  • Compliance
  • Computer Crime Survey
  • Computer Network Operation
  • Conficker
  • Confidential Connections
  • Conspiracy
  • Conspiracy Theory
  • Conti
  • Conti Ransomware
  • Conti Gang
  • Conti Ransomware
  • Conti Ransomware Gang
  • Cookies
  • CoolWebSearch
  • Corporate Risk Management
  • Counter Espionage
  • Counter Intelligence
  • Credit Cards
  • Crimeware
  • Critical Infrastructure
  • Crusade Affiliates
  • Crypters
  • Cryptography
  • Cryptome
  • Cryptoviral Extortion
  • CSIA
  • CVE
  • Cyber Attack
  • Cyber Espionage
  • Cyber Insurance
  • Cyber Jihad
  • Cyber Militia
  • Cyber Security Industry Alliance
  • Cyber Security Investment
  • Cyber Terrorism
  • Cyber Threat Actor Attribution Maltego Graphs
  • Cyber Warfare
  • Cyber Weapon
  • Cyber Weapons
  • CyberCamp 2016
  • Cybercrime
  • Cybercrime Ecosystem
  • Cybercrime Forum
  • Cybercrime Forum Data Set
  • Cybercrime Incident Response
  • Cybercrime Incident Response Maltego Graphs
  • Cybercrime Search Engine
  • Cybercriminal
  • Cyberpunk
  • Cyberspace
  • Cybertronics
  • Daniel Brandt
  • Dark Vader
  • Dark Forum
  • Dark Web
  • Dark Web Onion
  • Dark Web Search Engine
  • DarkComet RAT
  • Darkode
  • Darkode Forum Community
  • Data Acquisition
  • Data Breach
  • Data Center
  • Data Leak
  • Data Mining
  • David Endler
  • DCLeaks
  • DDoS
  • DDoS For Hire
  • Defense Complex
  • Delicious Information Warfare
  • Denmark
  • Department of Defense
  • DHS
  • DIA
  • Digital Armaments
  • Digital Forensics
  • Digital Rights
  • Dilbert
  • Distributed Computing
  • Distributed Computing Project
  • Distributed Project
  • DNS
  • DNS Changer
  • DoD
  • DoJ
  • DotCom
  • DreamHost
  • Dropbox
  • Durzhavna Sigurnost
  • DVD of the Weekend
  • E-Banking
  • E-Business
  • E-Commerce
  • E-Shop
  • Eavesdropping
  • Ebay
  • ECHELON
  • ECOFIN Projects
  • Economics
  • eID
  • Electric Universe
  • Electromagnetic Pulse Weapons
  • Electronic Banking
  • ELINT
  • Emotet
  • Emotet Botnet
  • EMP
  • Encrochat
  • Encrochat Database Leak
  • Encrypted Communication
  • Encrypted Phone
  • Encryption
  • Enigma
  • ENISA
  • Enki Bilal
  • Enron
  • Erasmus Bridge
  • Eric Goldman
  • Espionage
  • Espionage Movie
  • Evgeniy Mikhaylovich Bogachev
  • Exmanoize
  • Exploit Broker
  • Exploit Kit
  • Exploits
  • Eyeball Series
  • F-Secure
  • Facebook
  • Fake Account
  • Fake Adobe Flash Player
  • Fake Certificate
  • Fake Chrome Extension
  • Fake Chrome Update
  • Fake Code Signing Certificate
  • Fake Confirmed Facebook Friend Request Email
  • Fake Documents
  • Fake Facebook Appeal
  • Fake Facebook Notification
  • Fake Facebook Profile Spy Application
  • Fake Firefox Update
  • Fake Hosting Provider
  • Fake ID
  • Fake Internet Explorer Update
  • Fake Passport
  • Fake Personal ID
  • Fake Safari Update
  • Fake Security Software
  • Fake Tech Support Scam
  • Fake Utility Bill
  • Fake Video Codec
  • Fake Visa
  • Fake Visa Application
  • Fake Web Site
  • Fake Who's Viewed Your Facebook Profile Extension
  • Fake YouTube Player
  • Fast-Flux
  • FBI
  • FBI Most Wanted
  • FCC
  • FDIC
  • Financial Management
  • Firas Nur Al Din Dardar
  • FireEye
  • Flashpoint Intel
  • Foreign Influence Operations
  • Forensics
  • Forwarderz
  • FoxNews
  • Fraud
  • Free Speech
  • FSB
  • FTLog
  • FTLog Worm
  • Gartner
  • Gavril Danilkin
  • GazTranzitStroyInfo
  • GCHQ
  • GDBOP
  • Generation I
  • George Bush
  • Georgi Markov
  • Georgia
  • Germany
  • Gift Cards
  • GiveMeDB
  • Global Security Challenge
  • Goa Trance
  • GoDaddy
  • Google
  • Google Firebase
  • Google Ads
  • Google Docs
  • Google Earth
  • Google Groups
  • Google Hacking
  • Google Maps
  • Google Play
  • Google Store
  • Greece
  • Growth Hacker
  • GRU
  • Guccifer 2.0
  • GUI
  • Gumblar
  • Hacked Database
  • Hacked Web Site
  • Hacker
  • Hackers
  • Hacking
  • Hacking Book
  • Hacking Forum
  • Hacking Group
  • Hacking Groups
  • Hacking Tools
  • HackPhreak
  • HackPhreak Hacking Group
  • Hacktivism
  • Haiti
  • Hamas
  • Hezbollah
  • High Tech Brazil Hack Team
  • Hilary Kneber
  • HKLeaks
  • Home Molestation
  • Homebrew
  • Honeynet Project
  • Honker Union of China
  • HUMINT
  • ICBM
  • ID Theft
  • iDefense
  • Identity Theft
  • Illegal Arrest
  • Illegal Hosting
  • Illegal Restraint
  • IMINT
  • IMLogic
  • India
  • India Company
  • Indicator of Compromise
  • Information Operations
  • Information Security
  • Information Security Forum
  • Information Security Market
  • Information Warfare
  • Infrastructure Security
  • InFraud
  • InFraud Cybercrime Gang
  • InFraud Cybercrime Syndicate
  • InFraud Organization
  • InqTana Mac OS X Malware
  • Insider
  • Insider Monitoring
  • Insider Threat
  • Instant Messaging
  • Intellectual Property
  • Intelligence
  • Intelligence Agency
  • Intelligence Community
  • Internal Revenue Service
  • International Exploit Shop
  • Internet
  • Internet Censorship
  • Internet Economy
  • Internet Relay Chat
  • Investment Banking
  • IoC
  • IP Cloaking
  • IP Hiding
  • IP Spoofing
  • iPowerWeb
  • IPSec
  • IPv4
  • IPv6
  • Iran
  • Iran Election
  • Iran Election 2009
  • Iran Hacker Groups
  • Iran Hacking Groups
  • Iran Mabna Hackers
  • IRC
  • IRS
  • ISIS
  • Israel
  • Jabber
  • JabberZeuS
  • Javor Kolev
  • Jeffrey Carr
  • Joanna Rutkowska
  • Johannes Ullrich
  • John Young
  • K Rudolph
  • Kaseya
  • Kaseya Ransomware Attack
  • Katrina
  • Keylogger
  • KGB
  • Kidnapping
  • Koobface
  • Koobface Botnet
  • Korean Demilitarized Zone
  • KrotReal
  • Latest News Articles
  • Latvia
  • Law Enforcement
  • Lawful Interception
  • Leaks
  • Lenovo
  • Liberty Front Press Network
  • Lizamoon
  • Loads.cc
  • Localization
  • Location Tracking
  • Lockheed Martin
  • Logicube
  • Lone Gunmen
  • Lovely Horse
  • Lubyanka Square Headquarters
  • M4 Project
  • Mac OS X
  • Malicious Software
  • Maltego
  • Maltego Graphs
  • Malvertising
  • Malware
  • Malware Information Sharing Platform
  • Marketing
  • Mass Web Site Defacement
  • Mastercard
  • McAfee
  • MD5
  • Media Methane
  • Memoir
  • Metrics
  • Microsoft
  • Microsoft Live
  • Military Communications
  • Ministry of Interior
  • MISP
  • Missile Base
  • Mobile
  • Mobile Application
  • Mobile Communication Censorship
  • Mobile Internet
  • Mobile Location Tracking
  • Mobile Malware
  • Mobile Security
  • Mohammad Sagegh Ahmadzadegan
  • Money Laundering
  • Money Mule
  • Money Mule Recruitment
  • Monoculture
  • Morgan Stanley
  • Moses Staff
  • Most Wanted Cybercriminals
  • MSN
  • MSRC
  • MSRC Researcher Recognition Program
  • Muhammad Cartoons
  • MVR
  • MyWebFace
  • NASA
  • National Cyber Security Centre
  • National Security
  • Native Intelligence
  • NBC
  • NCSC
  • NetAssist LLC
  • NetCraft
  • Network Centric Warfare
  • Network Solutions
  • New Media
  • Nikolay Nedyalkov
  • Nikopol Trilogy
  • Nintendo
  • Nintendo DS
  • NordVPN
  • Norman Sandbox
  • North Korea
  • North Korea Missile Launch Pad
  • NSA
  • NSO Group
  • NSO Group Spyware
  • Nuclear Weapons
  • Nyxem
  • OEM
  • Offensive Cyber Warfare
  • OMEMO
  • Omerta
  • One-Time Password
  • One-Time Passwords In Everything
  • OneCare
  • Online Advertising
  • Online Fraud
  • Online Marketing
  • Online Propaganda Campaign
  • Online Scam
  • Open Source Malware
  • Operation EQUALIZER
  • Operation Uncle George
  • OPIE
  • OPSEC
  • Osama Bin Laden
  • OSINT
  • OSINT Training
  • OTC
  • OTP
  • Over-The-Counter
  • Packers
  • Parked Domains
  • Passwords
  • Pavlin Georgiev
  • Pay Per Install
  • PayPal
  • Perplex City
  • Persistent Cookies
  • Personal Career
  • Personal Data
  • Pharmaceutical Scams
  • Phileas Crawler
  • Phishing
  • Phishing Campaign
  • Phishing Domain Farm
  • Phishing Toolbar
  • PhishTube
  • Phreedom
  • Physical Security
  • Pinterest
  • Piracy
  • PlushForums
  • Podcast
  • Point of Sale Terrminal
  • Politics
  • PornTube
  • POS
  • Potentially Unwanted Application
  • PR
  • Press Coverage
  • Privacy
  • Project RAHAB
  • Prolexic
  • Protonmail
  • Proxy Service
  • Psychedelic Trance
  • PSYOPS
  • Psytrance
  • Psytrance Song of the Day
  • Qassam Cyber Fighters
  • Radicati Group
  • Ransomware
  • RAT
  • Ray Kurzweil
  • RBN
  • Reconnaissance Satellite
  • Red Joan
  • Regulation
  • Remote Access Tool
  • Reporters Without Borders
  • Return On Investment
  • Return On Security Investment
  • REvil Ransomware Group
  • Revolution in Militvry Affairs
  • RIPA
  • Risk Management
  • Rogue Account
  • Rogue Chrome Extension
  • Rogue Facebook Appeal
  • Rogue Security Software
  • Rogue Video Codec
  • Rogue YouTube Player
  • Rogueware
  • ROI
  • Roman Polesek
  • Root Server
  • Rootkit
  • ROSI
  • RSA
  • RSA Conference
  • Russia
  • Russia Small Group
  • Russian
  • Russian Bomber
  • Russian Business Network
  • Russian Submarine
  • Safe Harbor
  • Satellite Imagery
  • Satellite Jamming
  • Satellite SIGINT
  • Scam
  • Scams
  • Scandoo
  • ScanSafe
  • Scareware
  • Scientific Intelligence
  • Scribd
  • Search Engine
  • Search Engine Optimization
  • SEC
  • SecondEye Solutions
  • Secret Service
  • Secure Communication
  • SecureDrop
  • Securities and Exchange Commission
  • Security
  • Security Awareness
  • Security Book
  • Security Breach
  • Security Conference
  • Security Directory
  • Security Education
  • Security Event
  • Security Forum
  • Security Game
  • Security Industry
  • Security Interviews
  • Security Investment
  • Security Metrics
  • Security Podcast
  • Security Project
  • Security Research
  • Security Statistics
  • Security Training
  • Security Trends
  • Sensitive Information
  • SEO
  • Shadow Server
  • ShadowCrew
  • SIGINT
  • Silent Circle
  • Sipco Systems
  • SIPRNET
  • SITE Institute
  • SiteAdvisor
  • Skype
  • Sniffing
  • Social Engineering
  • Social Network Analysis
  • SocialMediaSystem
  • Software Piracy
  • Solarwinds
  • Song of the Day
  • Sophos
  • Soviet Union
  • Space Warfare
  • Space Weapons
  • Spam
  • Spam Campaign
  • Spam Operations
  • Spear Phishing
  • Spoofing
  • Sprott Asset Management
  • Spyware
  • SQL Injection
  • SSL
  • SSN
  • Stalkware
  • Starlight
  • Stealth Ideas Inc
  • Steganography
  • STIX
  • STIX2
  • Stolen Credit Card
  • Stolen Credit Cards
  • Stolen Gift Cards
  • Strider Crawler
  • Sub7
  • Suri Pluma
  • Surveillance
  • Swine Flu
  • Symantec
  • Symbian
  • Syria
  • Syrian Electronic Army
  • Syrian Embassy
  • Taia Global
  • TAN
  • TAXII
  • TDoS
  • Team Code Zero
  • Team Code Zero Hacking Group
  • Tech Support Scam
  • Technical Collection
  • Technical Mujahid
  • Telephony Denial of Service Attack
  • Terrorism
  • th3j35t3r
  • THAAD
  • The Bunker
  • The Immortals
  • The Lawnmower Man
  • The Outer Limits
  • Thought Leadership
  • Thousand Talents Program
  • Threat Intelligence
  • Threat Intelligence Feed
  • Threat Intelligence Report
  • TIA
  • Tipping Point
  • Top Secret Program
  • Tor
  • Tor Project
  • Torrent
  • TorrentReactor
  • Total Information Awareness
  • Travel Without Moving
  • TrendMicro
  • Trickbot
  • Trickbot Gang
  • Trickbot Malware
  • Trickbot Malware Gang
  • Trifinite Group
  • Trojan Horse
  • TROYAK-AS
  • Tutanota
  • Twitter
  • Two Factor Authentication
  • Two-Factor Authentication
  • Typosquatting
  • U.K National Cyber Security Centre
  • U.S Bureau of Engraving and Printing
  • U.S Cyber Command
  • U.S Driving License
  • U.S Elections
  • U.S Sanctions
  • U.S Secret Service
  • Underground Search Engine
  • United Kingdom
  • University ID Card
  • Vasil Moev Gachevski
  • Vault 7
  • VeriSign
  • Vertex Net Loader
  • Virtual Private Network
  • Virtual Reality
  • Virtual Reality Social Network
  • Virtual World
  • Virus
  • Virus for You
  • Virus Map
  • Virus Recovery Button
  • Viruses
  • VirusTotal
  • Visa
  • Visual Information System
  • Visualization
  • Void Balaur Malware Gang
  • VoIP
  • VPN
  • Vulnerabilities
  • Vulnerability Broker
  • War Driving
  • War Games
  • Weapon Systems
  • Web 2.0
  • Web Application Worm
  • Web Crawler
  • Web Inject
  • Web Proxy Service
  • Web Shells
  • Web Site Defacement
  • Web Site Defacement Groups
  • Webroot
  • WHGDG
  • WhoisXML API
  • WhoisXML API Jabber ZeuS Gang
  • Wireless
  • Wireless Hacking
  • Wireless Internet
  • Wiretapping
  • WMF Vulnerability
  • World Hacker Global Domination Group
  • X-Files
  • X-Tunnel
  • XMPP
  • XSS
  • Yahoo
  • Yaroslav Vasinskyi
  • Yavor Kolev
  • YouTube
  • ZDNet
  • ZDNet Zero Day Blog
  • Zero Day Exploit
  • Zero Day Initiative
  • Zerodium
  • ZeuS
  • Zombie Alert
  • Zone-H
  • Zotob

Popular Posts

    Exposing Bulgaria's Largest Data Leak - An OSINT Analysis Exposing Bulgaria's Largest Data Leak - An OSINT Analysis
    Exposing the Black Basta Ransomware Group - Part Three Exposing the Black Basta Ransomware Group - Part Three
    Exposing the Conti Ransomware Gang - An OSINT Analysis Exposing the Conti Ransomware Gang - An OSINT Analysis
    Azerbaijanian Embassies in Pakistan and Hungary Serving Malware Azerbaijanian Embassies in Pakistan and Hungary Serving Malware
    Joining Team Astalavista.box.sk - Official Project Re-Launch - Join us Today! Joining Team Astalavista.box.sk - Official Project Re-Launch - Join us Today!
    Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses
    New Project - Malware C&C Domains Offensive Network Reconnaissance Monitoring Project New Project - Malware C&C Domains Offensive Network Reconnaissance Monitoring Project
    Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts
    Dissecting 'Operation Ababil' - an OSINT Analysis Dissecting 'Operation Ababil' - an OSINT Analysis
Clicky
Copyright © 2012 Dancho Danchev's Blog - Mind Streams of Information Security Knowledge Published By Gooyaabi Templates.