• Sections
    • Cloud Computing
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
    • Containerization
    • Data Center
    • Mobile Technology
    • MS Exchange Server
    • Networking
    • Office 365
    • Security
      • Hacking & Cyberattacks
      • Malware
      • Compliance & Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
    • Virtualization
    • Windows 10
    • Windows Server
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
    • WServerNews
    • FitITproNews
  • Podcast
  • Product Directory
  • Webinars
  • About
    • Advertising
    • About Us
    • Contact Us
    • Meet The Team
    • Legal
      • Privacy Policy
      • Terms & Conditions
    • Sections
      • Cloud Computing
        • Amazon Web Services
        • Google Cloud
        • Microsoft Azure
      • Containerization
      • Data Center
      • Mobile Technology
      • MS Exchange Server
      • Networking
      • Office 365
      • Security
        • Hacking & Cyberattacks
        • Malware
        • Compliance & Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
      • Virtualization
      • Windows 10
      • Windows Server
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
      • WServerNews
      • FitITproNews
    • Podcast
    • Product Directory
    • Webinars
    • About
      • Advertising
      • About Us
      • Contact Us
      • Meet The Team
      • Legal
        • Privacy Policy
        • Terms & Conditions
    Author

    Dancho Danchev





    Security
    Phishing Metamorphosis in 2007 - Trend and Developments

    An account of various trends and developments that phishers embraced during 2007, and what are the driving factors behind the huge percentage increases in phishing emails during the year.

    Dancho Danchev Posted On December 12, 2007

    Security
    Popular Spammers Strategies and Tactics

    An assessement of several different recent spam campaigns, demonstrating the key concepts spammers use, and providing concise strategic advice on how to undermine their current model.

    Dancho Danchev Posted On November 14, 2007

    Access Control
    Passwords - Common Attacks and Possible Solutions

    Making sure authorized users have access to either sensitive company information or their personal e-mail can be a dauntning task, given the fact that an average user has to remember […]

    Dancho Danchev Posted On January 7, 2005

    Security
    SecurityTalk with K Rudolph, CISSP

    The SecurityTalks is an initiative aimed at providing the scene with the worlds' leading security experts' thoughts on various information security issues, in a way much different than […]

    Dancho Danchev Posted On May 3, 2004

    Malware
    Malware - It's Getting Worse

    The recent MyDoom Worm successfully infected enough victims in order to shut down SCO's web site, followed by new variants that targeted Microsoft's web site. This paper isn't intended to […]

    Dancho Danchev Posted On March 18, 2004

    Security
    Reducing "Human Factor" Mistakes

    Nowadays companies and organizations face the problem where massive attempts at illegal intrusions hit their network on a daily basis. In spite of the latest technological improvements in security, it's […]

    Dancho Danchev Posted On July 23, 2003

    Security
    Building and Implementing a Successful Information Security Policy

    Most recognize the necessity of having a security policy, but designing and successfully implementing one throughout your organization can be quite an intimidating task. To take the pain out of […]

    Dancho Danchev Posted On June 19, 2003

    1
    • Join Our Newsletter

      Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.

      Over 1,000,000 fellow IT Pros are already on-board, don't be left out!

    • Latest Podcast


    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • Samsung Galaxy Unpacked 2021: Galaxy S21, Galaxy Buds Pro, and more
      • IoT device security and the impact on remote working
      • Restoring reputation and customer trust after a data breach

    Copyright © 2021 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search