Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Webcast: Defending Against Web App Attacks Using ModSecurity
Later this month I will be presenting a free webcast on ModSecurity and how we can make better use ...
Continue Reading
Scary Web Services: Part 2
This post may seem timely in light of the recent Snapchat compromise. Although Snapchat’s breach ...
Continue Reading
Professionally Evil Speaking: Addressing the Real Issues Around Compliance in the Cloud Panel
Secure Ideas is excited to announce that I will be speaking as part of a panel later this month. On ...
Continue Reading
SamuraiWTF Training with Charlotte ISSA
Charlotte ISSA will be hosting a two-day Samurai-WTF (Web Testing Framework) course led by myself ...
Continue Reading
Intercepting DNS
Recently during a penetration test, I discovered a Linksys WRT54G wireless router that had been ...
Continue Reading
Professionally Evil Software: Laudanum 1.0 release!
Secure Ideas is excited to announce the immediate release of Laudanum 1.0. This open source project ...
Continue Reading
Why Target's Breach Included PIN Data
encryption |
PCI |
data breach |
target
Last Friday Target issued an update acknowledging that encrypted PIN data were included in the data ...
Continue Reading
Professionally Evil Training: Tactical Burp Suite Webinar
Tactical Burp Suite Webinar Secure Ideas is excited to announce its latest upcoming online ...
Continue Reading
Xbox One - Capturing the Configuration Traffic
One of the fun things about working at Secure Ideas are the conversations that we have about ...
Continue Reading
Target Security Breached: What You Need to Know
All it takes is one big nasty security breach and the whole world will be watching you through a ...
Continue Reading
Password Sharing Across Accounts
Over the past few years we have seen a large number of databases get compromised leading to the ...
Continue Reading
Has contents: true
Total pages: 38
Current page: 30