Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
Introduction to Laudanum
As a security consultant, there are so many scenarios that I run into every day that there is no ...
Continue Reading
Hi, I'm with IT and I'm Here to Steal From You
Beware of the Unknown IT Grunt I decided to continue on with the same theme as Kevin’s post about ...
Continue Reading
WinPhone 7: Fiddler Setup
One of the many tasks on any penetration tester’s to-do list is to set up a web proxy for debugging ...
Continue Reading
Finding the Leaks
One of the common vulnerabilities we find when performing internal network penetration testing is ...
Continue Reading
Spear Phishing: "You guys are Shady!"
This post is part of our Professionally Evil series of posts that discuss some of the experiences ...
Continue Reading
Happy New Years!
As we finish 2012 and look forward to 2013, Secure Ideas’ staff would like to wish everyone a happy ...
Continue Reading
Don’t Trust the Replacement Delivery Guy
Here at Secure Ideas we have had a ton of fun experiences during our work. When we teach or ...
Continue Reading
Installing RatProxy on Windows - Video Uploaded
A few months ago I did the original Installing RatProxy on Windows blog post that describes both ...
Continue Reading
Grey Box Penetration Testing
A common question I get from potential clients is “what is grey box testing and why do we need it?” ...
Continue Reading
SH5ARK: Taking a Byte out of HTML5
The new features in HTML5 have opened a whole new world of opportunities for developers and for ...
Continue Reading
How To: Encrypting Mac Mail
As a security consultant, frequently traveling, it is critical to implement security controls to ...
Continue Reading
Has contents: true
Total pages: 39
Current page: 37