AUTHOR

Secure Ideas

Stories by Secure


Ethics of Ethical Hacking

Ethical hacking uses the principles and techniques of hackers to help businesses protect their infrastructure and information (You could also say it...

Current State of Security in Healthcare

Healthcare organizations are a prime target for many malicious individuals and organizations in the information age. Identity thieves, blackmailers,...

Security Concerns around Remote Employees

In the cloud-based economy, businesses of every size are hiring remote employees. Remote employees may decrease their capital costs, free the...

Ransomware and Scareware Pop-ups

Every computer owner has had the heart-stopping moment where a popup comes up and says that your computer has been infected. Most people know that...

Ransomware Intelligence Briefing

Ransomware Intelligence Briefing Media reporting on the WannaCry ransomware campaign has contained exaggeration, bad information, and fear tactics....

Place Your Right Hand On This Glass

One of the hassles of the Yahoo! breach was clearly the coming-home-to-roost quality of the mega-stupid 90’s era “something about you” secret...

You Must Be This Tall . . .

Imagine going in to do an incident response at a fairly large customer that has no visibility within their firewalls, no intrusion detection, no...

SQLMap Beginnings: What and How

Testing web based applications is not only fun but is often multi-faceted and challenging. Often times a web front end will have places for data...

Reversing Type 7 Cisco Passwords

While working on a recent pen test, I came across a few Cisco routers sitting on an internal network. The fact that they were using default...

SamuraiWTF 3.2 RELEASED!

We are really excited to announce that SamuraiWTF 3.2 is now available publicly.  This release is available at...

Patching binaries with Backdoor Factory

When was the last time you downloaded a binary file from the Internet or grabbed one off of a network share that is used by your organization to...