Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Professionally Evil Web Penetration Testing Class
    Ever thought about being able to test the security of your web applications? Wanted to know how the ...
    Continue Reading
    Webcast: Comprehensive testing: Red and Blue Make Purple
    Secure Ideas is excited to announce a webcast scheduled for May 13th, 2014 on the topic of Purple ...
    Continue Reading
    Professionally Evil Training: Advanced Tactical Burp Webinar
    Secure Ideas is excited to announce its latest upcoming online training. We will be offering a ...
    Continue Reading
    Purple Teaming for Success
    You know what blue teams and red teams are. Red is our attack side, or the adversaries, and Blue is ...
    Continue Reading
    Professionally Evil Tools: MobiSec 1.3 Release
    Wow, I can’t believe how long this release has been in the making. a couple of years ago, we were ...
    Continue Reading
    Heartbleed: Complete Heart Surgery
    If you haven’t seen it in the news, you must not have any technology close by. That is right.. ...
    Continue Reading
    Windows XP: Eol, What you need to know
    Last week Windows XP finally reached its end of life. The operating system was released back in ...
    Continue Reading
    All Your Base Are Belong to #HeartBleed - OpenSSL Heartbeat Overflow
    What You Need to Know and Do About It Unless you’ve been hiding under a rock, I’m sure you have ...
    Continue Reading
    Auto-Updating Devices: How to Test?
    Everyday we see new technology and devices in our everyday lives that are connected to the ...
    Continue Reading
    Oversharing: Who Has Access?
    What types of information do you copy to a shared folder? Who has access to the share? This can be ...
    Continue Reading
    Secure Coding for Developers at Kingston MakerSpace, May 5-6
    I’m excited to announce that I will be returning to my hometown of Kingston, Ontario to teach a ...
    Continue Reading
    Has contents: true Total pages: 39 Current page: 28

    Never miss a professionally evil update!