VPNs for Normal People

It’s been quite a week in the media for VPN providers. Two large companies have had breaches of security in some way or another and the industry dumpster fire has had a fresh poke and a few new logs chucked …

Play Your Cards Right

The banks can put people off with their legal jargon and never-ending variables.
We have done the research and wanted to share the vitals on your rights to help shoppers stay safe.

Some AntiSocial Password Advice

Advice on passwords is getting out of hand. Just round and round in the echo chamber of infosec with our highly subjective opinions. It serves only to confuse users and does little to actually change the habits we see around password …

Blueteam Tools In My Toolbox

From the very start of being interested in ‘hacking’ and Information Security I do wonder what influences the style, the culture… I mean we all love InfoSec redteams and the ways for a brief moment our minds provide us with …

Two Factors Of Security

Note: Before starting this article we couldn’t miss the opportunity to recommend people to this web page should you need help setting up two factor on your accounts – https://twofactorauth.org/ Google’s announcement that 10% of users use 2-factor authentication has been …

Malicious Packets

Recently we had quite an interesting engagement and we have been allowed to share some of the details! Objective: Gain physical entry to a building for the purpose of impromptu network penetration test and wireless testing. Company Arena: Global Offices, Finance, …

How to Handle A Data Breach

To a modern business, a data breach can have devastating effects. We have seen TalkTalk hastily bungle, Sage coyly dawdle and much more generally mess it up, it’s got to change. We don’t spend all day hunting these elusive beasts either, but we have had …