Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Using a Throwing Star to Capture Packets
    Mobile applications are a hot commodity these days. It seems like everyone and their brother/sister ...
    Continue Reading
    Brute Forcing the Change Password Feature
    As a penetration tester, brute force attacks are something I test for on every application. ...
    Continue Reading
    Who are We: James Jardine
    To continue on with the series of “who we are” here at secure ideas, here is the second profile ...
    Continue Reading
    Mobile Security: Upcoming Events
    Mobile security is a very hot topic and there are some pretty cool events just around the corner. ...
    Continue Reading
    GSA Database May Have Leaked Information: Kevin Johnson was Interviewed
    Recently it was announced that there was a security flaw found in one of the GSA systems that could ...
    Continue Reading
    Podcast Show Notes: Why are Passwords so Difficult
    Kevin and James just finished up recording episode 2 of the Professionally Evil Perspective ...
    Continue Reading
    The Watering Hole: Is it Safe to Drink?
    How many times have you been told you have a vulnerability that you just don’t understand its ...
    Continue Reading
    Admin Consoles, Default Creds, and Sweet Pwnage
    When performing internal network penetration tests, one thing that really gets us excited is ...
    Continue Reading
    Ninja Developers Webcast Trilogy Overview
    Over the past three months, James Jardine and Kevin Johnson were featured in a webcast trilogy ...
    Continue Reading
    Decoding F5 Cookie
    As a Penetration Tester, there are many different things you come across while performing a test. ...
    Continue Reading
    Grab a CORS Light
    Many of you already know that any cross-site HTTP requests invoked from scripts running within a ...
    Continue Reading

    Never miss a professionally evil update!