Phish your company, before someone else does!

Today we are happy to release to the public: http://phish5.com Simply, Phish5 is Phishing as a service. It allows a fairly unsophisticated user to phish users in her organization, quickly, easily and from the comfort of her own browser. Why would we do this ? In the past year, a host of high profile news organizations were phished, and then publicly spanked. The attack that compromised the AP’s twitter account [Verge] even led to a visible dip on the Dow.

Continue Reading

Your company's security posture is probably horrible (but it might be OK).

The past few years have provided us with a number of high profile hacks and data breaches. In 2010 Google famously announced that they were hacked and put out details on the compromise (later dubbed the Aurora incident). In the months that followed, it became clear that google were not the only Aurora victims. Companies in almost every sector from DuPont to Disney were also breached (but were less forthcoming on the details). If these companies, widely lauded as having

Continue Reading

Introducing.. Signalnoi.se

This post is about 6 months overdue, but we have been busy with a whole bunch of interesting projects (which always manages to dent blogging time.) One of these projects, is http://signalnoi.se We formed Thinkst to work on difficult, interesting problems, and while working on security problems for a well known media organisation, we bumped into (a surprisingly common) problem organisations have: failing to benefit from the available insights afforded by the real-time social media networks. Signalnoi.se managed to win the Knight Fundation’s News Challenge

Continue Reading

Etsy shows established companies the way..

Fred Wilson over at AVC.com wrote a piece on the Etsy offices (in 2010) titled: “The office matters” In it he explained how “They are getting the best talent in NYC to come to their company” and commented on the importance of paying “attention to the office and the culture” of a company. Around the same time I had written a piece titled “Cargo Cult Startups” in which i posited that too many companies were faking startup culture, keeping draconian

Continue Reading

marco@thinkst.com

In 2009 I wrote a post on recruiting and mentioned “the T-shirt Test“. It read: The T-Shirt test is simply to ask yourself: “how will i feel standing at a conference, with this guy next to me wearing my company T-Shirt”. If you don’t like the thought, you shouldn’t make the hire. I still feel strongly about the T-Shirt test, and feel really strongly about the importance of company culture which makes it crazily cool to officially welcome Marco Slaviero

Continue Reading

Penetration Testing considered harmful today

Early last year we presented at 44con with a talk titled: “Penetration Testing considered harmful today“. 44con have just released the video so we figured it was worth a quick recap (for anyone not willing to tolerate the whiny voice!) The original slides (in PDF) are available (here) The central thesis of the talk is that penetration testing has established itself as a necessary activity for securing a network and is now pushed forward by a multi million dollar industry despite

Continue Reading

Penetration Testing considered Harmful Today

(This talk was given at 44Con in London (2010)) Brief details on it can be found here. The point of the next four slides is merely to establish some sort of credibility. Essentially it’s to try and establish that when I talk about pen testing, I do actually have some background in it. This is the central thesis of the talk, and I’ll try to explain why I believe this is true..  In 2010 we wrote a blog post titled

Continue Reading

BlackHat according to Twitter

For the first time in a decade I didn’t attend BlackHat USA in Las Vegas. I learned that South Africa in August is much colder than i recalled, but also had the chance to observe the conference from through a twitter-lense. It seemed as if there was more talk about parties, than content so I decided to grab all the tweets i could (#blackhat through the twitter search API) to do some simple grouping*. Whats clear straight off is that

Continue Reading

ShoulderPad Slashdotted! (and two clarifications)

(because we can’t have enough posts with exclamation marks in them) Our previous post (and research) seemed to go by pretty silently initially and then suddenly was everywhere. Andy Greenberg wrote a piece over at Forbes which really does deserve special mention. Tech journalists so often sensationalize security stories that many security researchers are quite afraid to even talk them. I certainly was, but his piece was fair, balanced and covered all the interesting points. +1 to him. The Forbes

Continue Reading

On-screen Keyboards Considered Harmful

(aka: Shoulder Surfing: There’s an App for that!) We rarely talk about it these days, but shoulder surfing is a pretty old (but reliable) attack. This is why most password prompts are masked. Many modern mobiles (and tablets) however will highlight keys pressed on the keyboard making old style shoulder surfing attacks trivial (and reasonably automatable) again. In an effort to (help) bring back the 90’s we decided to do some fiddling and built a quick app(on top of the

Continue Reading

Site Footer

Authored with 💚 by Thinkst