As the Snowden leaks continue to dribble out, it has become increasingly obvious that most nations planning for “cyber-war” have been merely sharpening knives for what looks like an almighty gunfight. We have to ask ourselves a few tough questions, the biggest of which just might be: “If the NSA was owning everything in sight (and by all accounts they have) then how is it that nobody ever spotted them?” The Snowden docs show us that high value targets have …
Author: haroon meer
You can watch it in action here: The videos were made with our early prototypes. The release birds are much much prettier! We think its insane that organizations that spent millions of dollars on cyber security took months (or years) to realize that they were breached. We think Canary fixes this elegantly and manages to do this at a super reasonable price-point. We have spent ages adding features, stripping features and making it a pleasure …
We gave 2 talks at Troopers15 this year. Marco & Azhar talked about Sockpuppets and Censorship 2.0. And i gave a somewhat hand-wavy talk titled: “The hard thing about the hard things“ (Some pretty smart people seemed to like them, so its probably worth a quick watch) …
The Internet lit up last week over the (very public) hack of Sony Pictures. There has been no shortage of commentary on the hack, from wild accusations involving evil-nation-states, to 0-day malware more complex than STUXNET. We believe that in all this noise, its easy to lose sight of some important lessons, and so tonight, we kicked out a ThinkstScapes Ad Hoc update on it. This Ad Hoc issue is being made available free here: If you aren’t a ThinkstScapes subscriber, and …
We presented at Hack in the Box Malaysia last week on research we have been doing for the past while on Sock Puppetry. We will post more details on the research in upcoming posts, but for now, you can grab a copy of the slides [here] [edit] Coverage of the talk on Digital News Asia : “Censorship 2.0: Shadowy forces controlling online conversations” [edit] Coverage of the talk on the register : “Stop and Thinkst: Is that really the Most Popular story …
(CCDCOE / June 2010) My original brief was to talk on how i would go about attacking a modern connected state. I noticed that Charlie (Miller) was covering this topic, so opted to go another route. For this talk my point is simply to point out, that there are probably some big holes in your current threat model. I’m from South Africa, and although WGN News sees very little difference between South America and South Africa, they are different places. …
We spent a bit of time on Patrick Grays excellent Risky.Biz this week, to talk about our ThinkstScapes service. We have been running ThinkstScapes for about 4 years now, and (so far) have never had a cancellation yet. (We take this to mean that people generally like it!) As part of the show, we gave away a free issue of the 2nd Quarter Research Roundup Issue for 2014. If you are not a subscriber, you can grab your [free copy …
At the end of last year we did BlackHats 2013 year in review. It was a webcast (which means you are spared seeing our faces, but not from hearing our voices or seeing our slides). Although its probably slightly dated, we think theres some value in it for those who didn’t dial in. You can grab a copy of the slides in PDF here, and can watch the video below: (talk starts at 2m07s) Ps. We know it’s dreadfully late to post …
Our ITWeb Security Summit keynote this year covered the Snowden Leaks from a South African point of view. Our talk was based on ideas we articulated in an op-ed piece for Al Jazeera last year, titled: “Silicon Valley, spy agencies and software sovereignty” ITWeb has already uploaded the video (Go ITWeb!) – Below you can grab a version of the video, with the slides added as an overlay (if nothing else, it makes the nasal voice more bearable) …
The video from the 44CON talk (A talk about (infosec) talks) we gave in September has been posted to YouTube. You can grab the slides [here] | You can watch the video online [here] …