Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Watching yOUr Permissions
    Often, one of the main goals of a pen tester is to get Domain Admin (DA) rights in a client’s ...
    Continue Reading
    Going the distance with Burp
    Welcome to the 5th blog on Burp Suite, and Happy 4th of July! Please visit Secure Ideas’ previous ...
    Continue Reading
    Ethics of Ethical Hacking
    Ethical hacking uses the principles and techniques of hackers to help businesses protect their ...
    Continue Reading
    Checking Under the Bed
    I’ve got four kids and part of their chores involve cleaning up their bedrooms. Inevitably, their ...
    Continue Reading
    Why are software updates important?
    We have all seen the alert that “updates are available,” or “software update needed.” How often ...
    Continue Reading
    The “Human Sensor” Continuum
    How people can counteract suspicious activity and crime in the workplace As a security professional ...
    Continue Reading
    The Importance of Log Reviews
    Most companies have logs that are generated daily, but not all companies think to review these or ...
    Continue Reading
    Escaping the Whale: Things you probably shouldn't do with Docker (Part 1)
    In this blog post, I won’t spend too much time explaining what Docker is and is not. You can do ...
    Continue Reading
    Information Security: A Strategy for Small Business
    The Internet’s importance to businesses of all sizes and across all industries is indisputable. ...
    Continue Reading
    Social Engineering - Why hack it, when people are just giving away their information!
    cybersecurity  |  scareware  |  social engineering  |  phishing  |  vishing
    In today’s technologically driven society, more and more criminals have turned to cyber crime as a ...
    Continue Reading
    A Brief Evolution of Web Apps
    Author’s Note: This was actually meant to be the first part of a series called Three C-Words of Web ...
    Continue Reading
    Has contents: true Total pages: 38 Current page: 21

    Never miss a professionally evil update!