• Twitter
  • LinkedIn
  • Email
April C Wright – Hacker, Speaker, Author
  • About
  • My Book
  • Schedule
  • Videos+Writings
  • Training
  • Consulting
  • Blog
  • Contact
Select Page

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

My MEDIUM Article: Cybersecurity Trends for 2019 — The Good and The Bad

Defense, Devil's Advocate, MEDIUM Articles, Privacy, Tech

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019 — The Good and The Bad

Video: Social Engineering At Work – How to use positive influence to gain management buy-in for anything @DerbyCon

Business, Career, Conferences, enterprise, Humans, Media, professionals, Social Skills, Talks, Tips

The first published recording of “Social Engineering At Work – How to use positive influence to gain management buy-in for anything”. Recorded at DerbyCon 2018, also presented at Social Engineering Rhode Island, GRRCon, CircleCityCon, BSM, etc....

Social Engineering At Work: Some books that have helped me

Business, Career, Humans, Social Engineering, Social Skills

I speak about using “Social Engineering at work” – how to gain and utilize positive influence to get things done – to help others learn how to play “the corporate game”, how to not lose themselves when practicing good office...

Physical Security Product Review – Portable Door Locks (PDLs) – Rishon Addalock VS. MasterBolt Travel Door Lock Security, Compared

Defense, Humans, Personal Security, Tech, Travel, Women in Tech

Introduction I travel a lot, sometimes alone. I have left hotels almost immediately after checking in because I felt unsafe with the accommodations. Sometimes a hotel will assign a room to two people by mistake, and one person walks in on the other using a valid key...

How to configure a Hak5 WiFi Pineapple NANO for Internet access in “Client Mode” using a USB WiFi adapter

Hacking, Hak5, Social Engineering, Tech

This post will explain how to setup Internet Access for a Hak5 WiFi Pineapple using a USB WiFi adapter connected directly to the Pineapple. By connecting a USB WiFi adapter, you add “wlan2” to the ports available for connections. The new...

How to configure Internet Connection Sharing between Mac OS X and a Hak5 WiFi Pineapple

Hacking, Hak5, Tech

Mac OS X can provide the Hak5 WiFi Pineapple with Internet connectivity for connected clients, but setting this up does require configuration of the Pineapple network configuration file before it will work. This is a step beyond what Windows and Linux users have to...

EU / GDPR People Search – Still Possible!

Humans, OSINT, Social Engineering

https://www.wired.co.uk/article/how-to-find-anyone http://www.peoplefinderadvice.com/people-search-europe.html http://www.myhometown-schools.co.uk http://www.nationalarchives.gov.uk http://www.friendsreunited.co.uk http://www.searchenginesoftheworld.com...

More seats opened in our previously sold-out class at BlackHat USA 2018!!!

Uncategorized

It’s the FINAL week to register for Jayson E. Street and my course at Black Hat USA, and a few seats were added in this previously *sold-out* class!   Learn the basics of #OSINT, @hak5 #BashBunny & #WiFiPineapple, and how to build a successful...

How To Determine What Your New DEF CON Group’s DCXXXX Number Will Be

DEF CON Groups

(Reprinted from https://defcongroups.org) As the DEF CON Groups Signaler (handling group communications), I wrote this to help all new DEF CON Groups community leaders in determining what their group name will be. ——————- How To...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
Follow @aprilwright
Black Hat USA 2020 Trainer Banner

Recommended Gear:

Search

Recent Posts

  • Physical destruction of data storage – Things to consider
  • 31 Days of Security Awareness in #DevSecOps – DAY 22 by Alyssa Miller (LinkedIn Post)
  • If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)
  • New talk posted to my media page!
  • I’m quoted in CSO Online article: 25 API Security Tips You’re Probably Not Considering

Tags

Android Apple authenticity centralized secrets choice nudging Defense empathy Hacking Hak5 Home Security Hostile Networks International Travel introversion introvert iOS ipad iphone Locks Locksport Mobile Devices office politics passwords PDL Penetration Testing Personal Security Physical Security Pineapple Nano Portable Door Lock privacy Protect my devices Protect yourself Recommendations smartphone Social Engineering Social Media Social Skills Software Tips Travel Traveling Abroad Travelling abroad Travel Security updates USB Thumbdrives Windows Mobile
Tweets by aprilwright

Search

Follow @aprilwright
  • Facebook
  • X
  • RSS