Tag Archive for: Part

Who is Dancho Danchev? – Part Two


Hello everyone,

This is Dancho and I would like to welcome you to my official “I’m now officially back” blog post detailing some of my current future and upcoming projects including a brief introduction to who I am to those unfamiliar with my research activities throughout the years where you can freely grab a E-Book copy of my blog in a full offline fashion from here.

My name is Dancho Danchev I’m a 38 years old security blogger OSINT analyst and threat intelligence analyst from Bulgaria. I’m currently running one of the security industry’s most popular security publications which is my personal blog – Dancho Danchev’s Blog – Mind Streams of Information Security Knowlwedge. I’ve been running my publication since December, 2005 and throughout the years I had an overage of 7,000 RSS feed subscribers including 5.6M page views throughout the years making my blog an extremely important switchboard to the world of security blogging OSINT research and analysis threat intelligence analysis and most importantly cybercrime fighting research and analysis.

I’m also acting as a DNS Threat Reseaarcher at WhoisXML API.

It’s been a while since I’ve last posted a quality video on YouTube and I’ve decided that this is going to be a pretty long and decent introduction into what I’ve been up to online since the 90’s up to present day where I’m an internationally recognized cybercrime researcher security blogger and threat intelligence analyst. In this rather long video I’ll walk you through my experience as a hacker enthusiast during the 90’s up to present day and I’ll also discuss in-depth a variety of personal projects including to offer a general discussion and overview on a variety of key topics that are currently active within the security industry including my personal career such as for instance.

Among my key accomplishments include my “lawful surveillance” and “lawful interceprtion” experience as teenage hacker the production of the popular Astalavista Security Newsletter circa 2003-2006 including the “take-down” of the Koobface botnet [MP3] including a participation in Top Secret GCHQ program called “Lovely Horse” including…

Source…

BlackBerry LIVE Interviews Experts on Mobility and UEM Part 3


It’s a common — and seemingly benign — business situation today:

CFO: “Hey, boss. The latest draft of the financial report for this quarter is ready for you to review.”

CEO: “Great, send it over. I’m on my way to the airport, but I’ll look it over on my phone.”

This innocent, everyday exchange could have serious ramifications for an organization. And most of us are blissfully unaware of the risk.

BlackBerry VP of Global Sales Engineering, Alex Willis, says this is because we don’t see a lot of big data breach headlines related to mobile devices. But that doesn’t mean they aren’t happening all around us, every day. “If credentials are stolen off a phone and then used elsewhere, the report gets tagged to the ‘elsewhere,’ not the phone.”

This failure to recognize or record the source of an attack leads organizations to believe that damaging cyberattacks and breaches do not occur on or through mobile devices, Willis says. “The reality is, that’s not true.” But the perception that our phones are secure creates gaps in many organizations’ cybersecurity defenses, and exposes their valuable data, according to Willis.

In Part 3 of my BlackBerry LIVE interview, I’m speaking with both Willis and Senior Director of Solutions Marketing Baldeep Dogra. Together, we explore the technological aspects of mobile security, including VPN, 2FA, zero trust, and how organizations use BlackBerry® Unified Endpoint Management (UEM) to complement Microsoft® Intune® to fill in security gaps. To learn more, watch the podcast, or read the excerpt below.



Steve Kovsky:


I’m Steve Kovsky. I’m editorial director at BlackBerry, and I’ve got two illustrious colleagues with me. We’re discussing mobility in the workplace, some of the security and usability challenges, and some of the ways that these are being addressed by the four pillars of cybersecurity. Joining me today, Baldeep Dagra, he’s senior director, solutions marketing and Alex Willis, vice president, global sales engineering. Gentlemen, thanks for being with us today.

As a tech journalist and a marketer working in cybersecurity, I’d certainly heard of MDM and maybe even…

Source…

UK to accelerate research on 5G and 6G technology as part of £110 million telecoms R and D package


  • Three top UK universities awarded £28 million to develop next-generation 6G network technology
  • Groundbreaking £80 million fund to set up state-of-the-art UK Telecoms Lab in the West Midlands for testing network equipment
  • UK joins forces with Republic of Korea to solve power efficiency challenges in rollout of more innovative and secure networks

Research and development on next-generation 5G and 6G wireless technology and telecoms security is to be ramped up as part of a £110 million government investment.

In the package announced today, three top UK universities, University of York, University of Bristol and University of Surrey, will receive a share of £28 million to team up with major telecoms companies including Nokia, Ericsson and Samsung to design and build networks of the future such as 6G.

The move will bolster the UK’s status as a global leader in telecoms research and follows Ericsson and Samsung’s recent decision to set up cutting-edge 6G research centres in the UK. It will also support the roll out of lightning-fast 5G by making it easier for more firms to enter the market.

The universities will work with world-leading UK academics and industry players to ensure future network technologies, including 6G, are designed in a way that promotes a more diverse and innovative telecoms market, and brings an end to current network setups where all equipment within a network must be from a single supplier.

The package includes £80 million for a state-of-the-art UK Telecoms Lab being built in Solihull in the West Midlands. Under a new contract the government has signed with the National Physical Laboratory, the lab will act as a secure research facility for mobile network operators, suppliers and academics to research and test the security, resilience and performance of their 5G and, in the future, 6G network technology. The facility will also create dozens of specialised jobs in telecoms and cyber security for the region.

A new R and D partnership with the Republic of Korea has also kicked off, which aims to accelerate the deployment of Open RAN and associated technologies. The joint project, which will receive more than £3 million (including £1.2 million…

Source…

October Is Cybersecurity Awareness Month. Part 3: Use Strong Passwords


In this multi-part series, we’ll look at what organizations can do to better improve corporate cybersecurity as part of October’s Cybersecurity Awareness Month. In this blog, our focus is using strong passwords.

Passwords and passcodes are now required on almost all devices, accounts, and systems. Making sure you use strong passwords will help keep you safe. We’ll look at what strong passwords are and how to go about using them.

Password security starts with creating a strong password. A strong password is:

  • At least 12 characters long but 14 or more is better.
  • A combination of uppercase letters, lowercase letters, numbers, and symbols.
  • Avoids words that can be found in a dictionary or the name of a person, character, product, or organization.
  • Significantly different from your previous passwords.
  • Easy for you to remember but difficult for others to guess. For example, consider a memorable phrase like “6CatzRLo0king^”.

You can also use passwords suggested by browsers or password managers, which we’ll discuss later.

Once you’ve created strong passwords, you’ll have to make sure you’re using them properly. For example, you’ll never want to share the passwords with anyone. Also, you’ll want to have a unique password for each device, application, and website. Next, you’ll want to be sure to change all default passwords on systems and devices. Some devices have been hacked because they come with default credentials like admin/admin from the factory and never prompt a user to update the password during first log in.

You can also use browsers to learn about your password hygiene. For example, for macOS users, Safari can be enabled to let you know if your passwords need to be changed because they are being reused or have been compromised.

To check on this, go to Safari > Preferences > Passwords. Here you can enable “Detect compromised passwords”.

Password Screen

If the password is compromised, you will be told why and be given the option to change and update the offending password:

Password Screen

Another bit of password hygiene to keep in mind is when you learn about a breach, either through news or from a notification email from a website, change your password immediately. You never want…

Source…