Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    Better API Penetration Testing with Postman - Part 1
    This is the first of a multi-part series on testing with Postman. I originally planned for it to be ...
    Continue Reading
    Android App Testing on Chromebooks
    Update: As of March 2021, I’d recommend using Android Virtual Devices over Chromebooks. Chromebooks ...
    Continue Reading
    How to Test Your Security Controls for Small/Medium Businesses
    We often get contacted by small businesses requesting their first penetration test because of ...
    Continue Reading
    Cave of Broken Mirrors: 3 Issues with AWS Cognito
    Rey while searching for someone finds a distorted reflection Secure Ideas is currently working on a ...
    Continue Reading
    Cracking WPA Pre Shared Keys
    This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed ...
    Continue Reading
    Three C-Words of Web App Security: Part 3 – Clickjacking
    This is the third and final part in this three-part series, Three C-Words of Web Application ...
    Continue Reading
    Fuzz Testing
    If you have a brand new piece of software, a program, a network, or an operating system, you will ...
    Continue Reading
    #AffordableTraining requires change
    In 2019 Secure Ideas is dedicated to offering affordable security training to everyone. This ...
    Continue Reading
    What is Physical Security?
    Ok, I’m just going to say it, I’m a physical security guy in a IT security world. So why physical ...
    Continue Reading
    Stored XSS: What Is It
    In the cyber security world, there are a number of vulnerabilities to be aware of. Today we’re ...
    Continue Reading
    A Container Hacker’s Guide to Living Off of the Land
    Sometimes as a pentester you find yourself in tricky situations. Depending on the type of ...
    Continue Reading
    Has contents: true Total pages: 31 Current page: 19

    Never miss a professionally evil update!