Contact Us Today 01642 716680

cybersecurity

Are Wireless Networks Secure?

Wireless networks are generally a weaker alternative to a hardwire connections. Why is this? Well, if the wireless network’s traffic is open, then anyone within range can gain access which means it’s vulnerable to a ‘sniffing attack’. Modern wireless networks get around this by using encryption that requires a secret key.  How are wireless networks … Read more

What is OSINT?

OSINT or Open-source Intelligence is a process of data collection using sources that are open to the public. This can be a wide range of origins – anything from large blogs to specific images and the metadata contained within. Everything posted online discloses some information about the poster and this is what OSINT is looking … Read more

What is Web Application Security Testing?

Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These vulnerabilities can have wide-reaching consequences to the application as well as the data stored within its database. 

How To Become A Penetration Tester

Blog art

Let us look into how to become a Penetration Tester or ‘Pentester’. The more penetration testers the better. With the world of ‘hacking’ ahead of you, it can be hard to know where to start. This blog post hopes to point you in the right direction and give you a guide to the mindset needed to become good at penetration testing.

Corporate Hacking Surges

Blog art

Corporate hacking surges are becoming more frequent. Work-from-home policies have contributed to a large surge in hacking against corporations. Many staff have made the transition to working from their homes amidst the global covid-19 pandemic. As a result we are seeing malicious activity more than double in many countries.