Dancho Danchev

Contributor

Dancho Danchev is an independent security consultant and cyber threats analyst, with extensive experience in open source intelligence gathering, and cybercrime incident response. He's been an active security blogger since 2007, and maintains a popular security blog sharing real-time threats intelligence data with the rest of the community on a daily basis.ggMore details on Dancho Danchev's current and past professional affiliations, can be found in his LinkedIn profile. You can also follow him on Twitter

More details on Dancho Danchev's current and past professional affiliations, can be found in his LinkedIn profile.

Latest from Dancho Danchev

Show search filters
Image Gallery: Avast! Antivirus office in Prague, Czech Republic

Image Gallery: Avast! Antivirus office in Prague, Czech Republic

With over 100 million users internationally, Avast! Antivirus reliance on the Freemium business model, has offered the company an unprecedented opportunity for a cost-effective worldwide market penetration. At a recent PR event in Prague, the Czech Republic, Avast! executives explained this business model, and offered insights into some of the current trends within the antivirus market.

July 28, 2010 by in Security

Image Gallery: April's cyber threat landscape

Image Gallery: April's cyber threat landscape

Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.

April 29, 2010 by in Enterprise Software

Mac OS X ransomware - hype or real threat?

Mac OS X ransomware - hype or real threat?

In need of a fresh example that cybercriminals are actively looking for ways to monetize infected Mac OS X hosts? Early-stage discussions at several web forums, including a PoC (proof of concept, source code included) as well as the following potential layouts speak for themselves.Read the article: Mac OS X SMS ransomware - hype or real threat?

March 17, 2010 by in Enterprise Software

The ultimate guide to scareware protection

The ultimate guide to scareware protection

Taking into consideration the fact that 99% of ongoing scareware campaigns rely on "visual social engineering", this gallery presents some of the most popular templates used by cybercrime gangs in an attempt to trick the end user into installing the fake security software.

September 13, 2009 by in Security

Inside the botnets that never make the news

Inside the botnets that never make the news

This gallery offers an inside view of those "beneath the radar" botnets that never make the news. The images have been collected throughout the past year by using open source intelligence, namely, by either joining the command and control IRC channel upon infection, or monitoring ongoing communications between the botnet masters.If you ever wanted to take an inside view of targeted-botnets primarily run by novice cybercriminals sometimes utilizing outdated, but very effective methods - this gallery is for you.

May 20, 2009 by in Security