Homepage
Open in app
Sign in
Get started
secjuice™
secjuice™ is your daily shot of opinion, analysis & insight from some of the sharpest wits in cybersecurity, information security, network security and OSINT.
Opinion
OSINT
How To
Write For Us
Hire A Writer
Check Out Our Main Site !!
Follow
Secjuice Is Abandoning Medium — Why Medium Doesn't Deserve Our Publication
Secjuice Is Abandoning Medium — Why Medium Doesn't Deserve Our Publication
Medium has become increasingly hostile to publications and in response to their latest changes which hurt lots of publications financially…
Guise Bule
Jun 11, 2018
Building A HackTheBox FluxCapacitor
Building A HackTheBox FluxCapacitor
What I Learned Making This Box For HTB
theMiddle
May 20, 2018
Cash is Cyber King
Cash is Cyber King
The recent Chili’s credit card data breach prompted me to revisit my views on credit cards.
Miguel A. Calles · Serverless CISO
May 16, 2018
Racing the Risk
Racing the Risk
Panicked responses to cyber-attacks often result in a race against risk that leads to rash and costly actions. If your organisation falls…
XQ Cyber
May 15, 2018
{Hack the Box} \\ FluxCapacitor Write-Up
{Hack the Box} \\ FluxCapacitor Write-Up
Make like a leaf and tree while you still can.
Oneeb Malik
May 14, 2018
Private Email & Messaging Platforms for Communicating In Confidence
Private Email & Messaging Platforms for Communicating In Confidence
Using the internet with any expectation of privacy is becoming much more rare. A new privacy scandal seems to pop up as soon as the last…
Christian Stewart ✔️
May 14, 2018
GDPR, Ragnarok Online and Decision Analysis
GDPR, Ragnarok Online and Decision Analysis
Gravity Interactive pulled out of the EU market rather than comply with GDPR. What can decision analysis teach us about this move?
Tony Martin-Vegue
May 6, 2018
Busting Cyber Myths: There’s a Silver Bullet
Busting Cyber Myths: There’s a Silver Bullet
Sometimes the cybersecurity industry can be its own worst enemy.
XQ Cyber
May 4, 2018
3 SMALL BUSINESS CYBERSECURITY TIPS FROM A SMALL BUSINESS IN CYBERSECURITY
3 SMALL BUSINESS CYBERSECURITY TIPS FROM A SMALL BUSINESS IN CYBERSECURITY
Dedicated to small business week –
JonSantavy
Apr 30, 2018
{Hack the Box} \\ Bashed Write-Up
{Hack the Box} \\ Bashed Write-Up
For when you want to bash your computer against a brick wall.
Oneeb Malik
Apr 28, 2018
Busting Cyber Myths — ‘There’s nothing I can do’
Busting Cyber Myths — ‘There’s nothing I can do’
Many people believe that cybersecurity is something that is beyond them, a mysterious dark art or that its somebody else’s problem.
XQ Cyber
Apr 27, 2018
Watch Premium Content On Your Favourite Streaming App For Free — Part 2
Watch Premium Content On Your Favourite Streaming App For Free — Part 2
In my last post I talked about getting access to premium content on your favourite streaming app by changing the parameters defining the…
Vaishali Garg
Apr 27, 2018
Why Privacy Is The Internet’s Most User-Friendly Feature
Why Privacy Is The Internet’s Most User-Friendly Feature
Privacy empowers users with control over how companies collect and use their data.
Christian Stewart ✔️
Apr 26, 2018
Pwned by a Shortcut
Pwned by a Shortcut
No, this is not about some fancy exploit.
Tom Melo
Apr 25, 2018
Busting Cyber Myths — I’m Too Small To Be A Target
Busting Cyber Myths — I’m Too Small To Be A Target
There are many myths about cybersecurity created unhelpfully in part by the industry itself and by the way in which the issue of cybercrime…
XQ Cyber
Apr 23, 2018
Social Media Privacy Issues, Featuring Google, Facebook, Amazon & Reddit
Social Media Privacy Issues, Featuring Google, Facebook, Amazon & Reddit
Many of the websites that millions of us visit every day collect data about their visitors, putting both the websites and the users at risk…
Christian Stewart ✔️
Apr 18, 2018
Privacy And The Trail You Leave Behind
Privacy And The Trail You Leave Behind
All of us, as active users of internet specially the social media, are always concerned about our privacy and our data that is processed by…
Ugnes
Apr 13, 2018
Reasons You Should Use A Private Search Engine
Reasons You Should Use A Private Search Engine
Privacy-focused tools are the most user-friendly on the internet. This is because by protecting their users’ information, rather than using…
Christian Stewart ✔️
Apr 12, 2018
NCSC’s latest advisory further highlights the importance of securing supply chains
NCSC’s latest advisory further highlights the importance of securing supply chains
The NCSC advisory on compromises to UK organisations in the engineering and Industrial Control System (ICS) environments by hostile state…
XQ Cyber
Apr 10, 2018
Under Armour, Facebook, and Wearables — Consumer Cyber Risk
Under Armour, Facebook, and Wearables — Consumer Cyber Risk
Apps like MyFitnessPal, Facebook, and wearable tech allow you to track what’s most important to you & hackers what’s most important to…
JonSantavy
Mar 30, 2018
Google Security Advisory: How To Protect Your Login & Admin Credentials
Google Security Advisory: How To Protect Your Login & Admin Credentials
A guide to applying second step verification and multi factor authentication technologies with Google
Rob
Mar 28, 2018
[RE Roulette] Introduction
[RE Roulette] Introduction
Well, I’m taking the Reverse Engineering dive.
Mitch Edwards
Mar 27, 2018
A Closer Look At Famous Hackers (Part 1) — Owen “AKILL” Walker
A Closer Look At Famous Hackers (Part 1) — Owen “AKILL” Walker
Hello there and welcome to my latest infosec article! This time I thought that I would write about something a little different and focus…
Gabriel Duarte
Mar 27, 2018
[HtGFW Dev Blog] Edge Cases upon Nested Edge Cases…
[HtGFW Dev Blog] Edge Cases upon Nested Edge Cases…
Sigh… Edge cases suck.
Mitch Edwards
Mar 26, 2018
Third Party Privacy Concerns Go Beyond Social Media
Third Party Privacy Concerns Go Beyond Social Media
Data privacy is in the headlines again as social media giant Facebook comes under scrutiny for the way in which it protects user data. It…
XQ Cyber
Mar 26, 2018
About secjuice™
Latest Stories
Archive
About Medium
Terms
Privacy
Teams