Misery Business: Sextortion Emails

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€
Content Warning: This post includes discussion of sensitive topics such as revenge porn and blackmail. This week I’m primarily going to cover sextortion phishing campaigns, and a little about how to deal with these sorts of emails. I’ll also include some resources at the end of the post discussing general (non-phishing) sextortion, and organisations who can help if somebody tries to blackmail you with, or releases your personal content without your consent.

B3st Pass**rd Pr@ct!ces

Estimated difficulty: πŸ’œπŸ€πŸ€πŸ€πŸ€ Passwords have been a form of securing your accounts for years. They are your key to unlock the door to your account for want of a better metaphor. You are the only person that should know your password, as the creator and keeper of this information. My Continue Reading

STOP! In the Name of Web: Intercepting Traffic with BurpSuite (A Beginner’s Guide)

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ€πŸ€ Another song themed blog, this blog will mostly cover BurpSuite interception basics (including how to setup BurpSuite). We will be demonstrating BurpSuite using Kali Linux, using the Community Version (1.7.35). As always, constructive criticisms and feedback are always welcome! Back to Basics Before we dive into the Continue Reading

Dank Docker Development

Estimated Difficulty: πŸ’œπŸ’œπŸ’œπŸ€πŸ€ I’m sure you have all heard the whispers that Security folk dislike the Developer folk… However, the time has come for the Security-Developer to be born! I don’t know about you, but I am all for making my life easier and after a dissertation full of failures, Continue Reading