Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Introduction to Laudanum
    As a security consultant, there are so many scenarios that I run into every day that there is no ...
    Continue Reading
    Hi, I'm with IT and I'm Here to Steal From You
    Beware of the Unknown IT Grunt I decided to continue on with the same theme as Kevin’s post about ...
    Continue Reading
    WinPhone 7: Fiddler Setup
    One of the many tasks on any penetration tester’s to-do list is to set up a web proxy for debugging ...
    Continue Reading
    Finding the Leaks
    One of the common vulnerabilities we find when performing internal network penetration testing is ...
    Continue Reading
    Spear Phishing: "You guys are Shady!"
    This post is part of our Professionally Evil series of posts that discuss some of the experiences ...
    Continue Reading
    Happy New Years!
    As we finish 2012 and look forward to 2013, Secure Ideas’ staff would like to wish everyone a happy ...
    Continue Reading
    Don’t Trust the Replacement Delivery Guy
    Here at Secure Ideas we have had a ton of fun experiences during our work. When we teach or ...
    Continue Reading
    Installing RatProxy on Windows - Video Uploaded
    A few months ago I did the original Installing RatProxy on Windows blog post that describes both ...
    Continue Reading
    Grey Box Penetration Testing
    A common question I get from potential clients is “what is grey box testing and why do we need it?” ...
    Continue Reading
    SH5ARK: Taking a Byte out of HTML5
    The new features in HTML5 have opened a whole new world of opportunities for developers and for ...
    Continue Reading
    How To: Encrypting Mac Mail
    As a security consultant, frequently traveling, it is critical to implement security controls to ...
    Continue Reading
    Has contents: true Total pages: 39 Current page: 37

    Never miss a professionally evil update!