Homepage
Open in app
Sign inGet started

secjuice™

secjuice™ is your daily shot of opinion, analysis & insight from some of the sharpest wits in cybersecurity, information security, network security and OSINT.

  • Opinion
  • OSINT
  • How To
  • Write For Us
  • Hire A Writer
  • Check Out Our Main Site !!
  • Secjuice Is Abandoning Medium — Why Medium Doesn't Deserve Our Publication

    Secjuice Is Abandoning Medium — Why Medium Doesn't Deserve Our Publication

    Medium has become increasingly hostile to publications and in response to their latest changes which hurt lots of publications financially…
    Go to the profile of Guise Bule
    Guise Bule
    Jun 11, 2018
    Building A HackTheBox FluxCapacitor

    Building A HackTheBox FluxCapacitor

    What I Learned Making This Box For HTB
    Go to the profile of theMiddle
    theMiddle
    May 20, 2018
    Cash is Cyber King

    Cash is Cyber King

    The recent Chili’s credit card data breach prompted me to revisit my views on credit cards.
    Go to the profile of Miguel A. Calles MBA
    Miguel A. Calles MBA
    May 16, 2018
    Racing the Risk

    Racing the Risk

    Panicked responses to cyber-attacks often result in a race against risk that leads to rash and costly actions. If your organisation falls…
    Go to the profile of XQ Cyber
    XQ Cyber
    May 15, 2018
    {Hack the Box} \\ FluxCapacitor Write-Up

    {Hack the Box} \\ FluxCapacitor Write-Up

    Make like a tree and leaf while you still can.
    Go to the profile of Oneeb Malik
    Oneeb Malik
    May 14, 2018
    Private Email & Messaging Platforms for Communicating In Confidence

    Private Email & Messaging Platforms for Communicating In Confidence

    Using the internet with any expectation of privacy is becoming much more rare. A new privacy scandal seems to pop up as soon as the last…
    Go to the profile of Christian Stewart ✔️
    Christian Stewart ✔️
    May 14, 2018
    GDPR, Ragnarok Online and Decision Analysis

    GDPR, Ragnarok Online and Decision Analysis

    Gravity Interactive pulled out of the EU market rather than comply with GDPR. What can decision analysis teach us about this move?
    Go to the profile of Tony Martin-Vegue
    Tony Martin-Vegue
    May 6, 2018
    Busting Cyber Myths: There’s a Silver Bullet

    Busting Cyber Myths: There’s a Silver Bullet

    Sometimes the cybersecurity industry can be its own worst enemy.
    Go to the profile of XQ Cyber
    XQ Cyber
    May 4, 2018
    3 SMALL BUSINESS CYBERSECURITY TIPS FROM A SMALL BUSINESS IN CYBERSECURITY

    3 SMALL BUSINESS CYBERSECURITY TIPS FROM A SMALL BUSINESS IN CYBERSECURITY

    Dedicated to small business week –
    Go to the profile of JonSantavy
    JonSantavy
    Apr 30, 2018
    {Hack the Box} \\ Bashed Write-Up

    {Hack the Box} \\ Bashed Write-Up

    For when you want to bash your computer against a brick wall.
    Go to the profile of Oneeb Malik
    Oneeb Malik
    Apr 28, 2018
    Busting Cyber Myths — ‘There’s nothing I can do’

    Busting Cyber Myths — ‘There’s nothing I can do’

    Many people believe that cybersecurity is something that is beyond them, a mysterious dark art or that its somebody else’s problem.
    Go to the profile of XQ Cyber
    XQ Cyber
    Apr 27, 2018
    Watch Premium Content On Your Favourite Streaming App For Free — Part 2

    Watch Premium Content On Your Favourite Streaming App For Free — Part 2

    In my last post I talked about getting access to premium content on your favourite streaming app by changing the parameters defining the…
    Go to the profile of Vaishali Garg
    Vaishali Garg
    Apr 27, 2018
    Why Privacy Is The Internet’s Most User-Friendly Feature

    Why Privacy Is The Internet’s Most User-Friendly Feature

    Privacy empowers users with control over how companies collect and use their data.
    Go to the profile of Christian Stewart ✔️
    Christian Stewart ✔️
    Apr 26, 2018
    Pwned by a Shortcut

    Pwned by a Shortcut

    No, this is not about some fancy exploit.
    Go to the profile of Tom Melo
    Tom Melo
    Apr 25, 2018
    Busting Cyber Myths — I’m Too Small To Be A Target

    Busting Cyber Myths — I’m Too Small To Be A Target

    There are many myths about cybersecurity created unhelpfully in part by the industry itself and by the way in which the issue of cybercrime…
    Go to the profile of XQ Cyber
    XQ Cyber
    Apr 23, 2018
    Social Media Privacy Issues, Featuring Google, Facebook, Amazon & Reddit

    Social Media Privacy Issues, Featuring Google, Facebook, Amazon & Reddit

    Many of the websites that millions of us visit every day collect data about their visitors, putting both the websites and the users at risk…
    Go to the profile of Christian Stewart ✔️
    Christian Stewart ✔️
    Apr 18, 2018
    Privacy And The Trail You Leave Behind

    Privacy And The Trail You Leave Behind

    All of us, as active users of internet specially the social media, are always concerned about our privacy and our data that is processed by…
    Go to the profile of Shivam Singh Sengar
    Shivam Singh Sengar
    Apr 13, 2018
    Reasons You Should Use A Private Search Engine

    Reasons You Should Use A Private Search Engine

    Privacy-focused tools are the most user-friendly on the internet. This is because by protecting their users’ information, rather than using…
    Go to the profile of Christian Stewart ✔️
    Christian Stewart ✔️
    Apr 12, 2018
    NCSC’s latest advisory further highlights the importance of securing supply chains

    NCSC’s latest advisory further highlights the importance of securing supply chains

    The NCSC advisory on compromises to UK organisations in the engineering and Industrial Control System (ICS) environments by hostile state…
    Go to the profile of XQ Cyber
    XQ Cyber
    Apr 10, 2018
    Under Armour, Facebook, and Wearables — Consumer Cyber Risk

    Under Armour, Facebook, and Wearables — Consumer Cyber Risk

    Apps like MyFitnessPal, Facebook, and wearable tech allow you to track what’s most important to you & hackers what’s most important to…
    Go to the profile of JonSantavy
    JonSantavy
    Mar 30, 2018
    Google Security Advisory: How To Protect Your Login & Admin Credentials

    Google Security Advisory: How To Protect Your Login & Admin Credentials

    A guide to applying second step verification and multi factor authentication technologies with Google
    Go to the profile of Rob
    Rob
    Mar 28, 2018
    [RE Roulette] Introduction

    [RE Roulette] Introduction

    Well, I’m taking the Reverse Engineering dive.
    Go to the profile of Mitch Edwards
    Mitch Edwards
    Mar 27, 2018
    A Closer Look At Famous Hackers (Part 1) — Owen “AKILL” Walker

    A Closer Look At Famous Hackers (Part 1) — Owen “AKILL” Walker

    Hello there and welcome to my latest infosec article! This time I thought that I would write about something a little different and focus…
    Go to the profile of Gabriel Duarte
    Gabriel Duarte
    Mar 27, 2018
    [HtGFW Dev Blog] Edge Cases upon Nested Edge Cases…

    [HtGFW Dev Blog] Edge Cases upon Nested Edge Cases…

    Sigh… Edge cases suck.
    Go to the profile of Mitch Edwards
    Mitch Edwards
    Mar 26, 2018
    Third Party Privacy Concerns Go Beyond Social Media

    Third Party Privacy Concerns Go Beyond Social Media

    Data privacy is in the headlines again as social media giant Facebook comes under scrutiny for the way in which it protects user data. It…
    Go to the profile of XQ Cyber
    XQ Cyber
    Mar 26, 2018
    About secjuice™Latest StoriesArchiveAbout MediumTermsPrivacy