Ethical hackers say it would take mere hours to empty your network

Just your average information security researcher from Delaware US.

Once they’ve broken into an IT environment, most intruders need less than five hours to collect and steal sensitive data,

Read more

How to tell if someone is stealing your home WiFi

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Is your home WiFi sluggish? If you suspect someone is stealing your WiFi, here’s how you can detect and block

Read more

10+ penetration testing tools the pros use

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

Beginner looking to skill up? here’s where to start What is penetration testing? Penetration testing (or pentesting) is a simulated

Read more