Professionally Evil Insights
Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.
Welcome aboard!
That looks ODD Securing your workspace
When you look at “security” and the big picture, it always seems to come down to the decisions made ...
Continue Reading
Better API Penetration Testing with Postman – Part 3
In Part 1 of this series, we got started with Postman and generally creating collections and ...
Continue Reading
We take security seriously and other trite statements
Earlier this week, Secure Ideas sent an initial notification regarding an incident targeting us ...
Continue Reading
Better API Penetration Testing with Postman – Part 2
In Part 1 of this series, I walked through an introduction to Postman, a popular tool for API ...
Continue Reading
Security Misconfigurations
The configuration of web and application servers is a very important aspect of web applications. ...
Continue Reading
Better API Penetration Testing with Postman - Part 1
This is the first of a multi-part series on testing with Postman. I originally planned for it to be ...
Continue Reading
Android App Testing on Chromebooks
Update: As of March 2021, I’d recommend using Android Virtual Devices over Chromebooks. Chromebooks ...
Continue Reading
How to Test Your Security Controls for Small/Medium Businesses
We often get contacted by small businesses requesting their first penetration test because of ...
Continue Reading
Cave of Broken Mirrors: 3 Issues with AWS Cognito
Rey while searching for someone finds a distorted reflection Secure Ideas is currently working on a ...
Continue Reading
Cracking WPA Pre Shared Keys
This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed ...
Continue Reading
Three C-Words of Web App Security: Part 3 – Clickjacking
This is the third and final part in this three-part series, Three C-Words of Web Application ...
Continue Reading
Has contents: true
Total pages: 30
Current page: 18