• Twitter
  • LinkedIn
  • Email
0 Items
April C Wright
  • About
  • My Book
  • Schedule
  • Media
  • Training
  • Consulting
  • Blog
  • Shop
  • Contact
Select Page

My MEDIUM Article: Is it even possible to be “completely secure”?

Business, Defense, Devil's Advocate, Humans, MEDIUM Articles, Mobile and Device, Personal Security, Privacy, Software

Check out my latest article on MEDIUM: Is it even possible to be “completely secure”? https://medium.com/@aprilcwright/is-it-even-possible-to-be-completely-secure-6c7a92a297a9

My MEDIUM Article: Cybersecurity Trends for 2019 — The Good and The Bad

Defense, Devil's Advocate, MEDIUM Articles, Privacy, Tech

Check out my latest article on MEDIUM: Cybersecurity Trends for 2019 — The Good and The Bad

Video: Social Engineering At Work – How to use positive influence to gain management buy-in for anything @DerbyCon

Business, Career, Conferences, enterprise, Humans, Media, professionals, Social Skills, Talks, Tips

The first published recording of “Social Engineering At Work – How to use positive influence to gain management buy-in for anything”. Recorded at DerbyCon 2018, also presented at Social Engineering Rhode Island, GRRCon, CircleCityCon, BSM, etc....

Social Engineering At Work: Some books that have helped me

Business, Career, Humans, Social Engineering, Social Skills

I speak about using “Social Engineering at work” – how to gain and utilize positive influence to get things done – to help others learn how to play “the corporate game”, how to not lose themselves when practicing good office...

Physical Security Product Review – Portable Door Locks (PDLs) – Rishon Addalock VS. MasterBolt Travel Door Lock Security, Compared

Defense, Humans, Personal Security, Tech, Travel, Women in Tech

Introduction I travel a lot, sometimes alone. I have left hotels almost immediately after checking in because I felt unsafe with the accommodations. Sometimes a hotel will assign a room to two people by mistake, and one person walks in on the other using a valid key...

How to configure a Hak5 WiFi Pineapple NANO for Internet access in “Client Mode” using a USB WiFi adapter

Hacking, Hak5, Social Engineering, Tech

This post will explain how to setup Internet Access for a Hak5 WiFi Pineapple using a USB WiFi adapter connected directly to the Pineapple. By connecting a USB WiFi adapter, you add “wlan2” to the ports available for connections. The new...

How to configure Internet Connection Sharing between Mac OS X and a Hak5 WiFi Pineapple

Hacking, Hak5, Tech

Mac OS X can provide the Hak5 WiFi Pineapple with Internet connectivity for connected clients, but setting this up does require configuration of the Pineapple network configuration file before it will work. This is a step beyond what Windows and Linux users have to...

EU / GDPR People Search – Still Possible!

Humans, OSINT, Social Engineering

https://www.wired.co.uk/article/how-to-find-anyone http://www.peoplefinderadvice.com/people-search-europe.html http://www.myhometown-schools.co.uk http://www.nationalarchives.gov.uk http://www.friendsreunited.co.uk http://www.searchenginesoftheworld.com...

More seats opened in our previously sold-out class at BlackHat USA 2018!!!

Uncategorized

It’s the FINAL week to register for Jayson E. Street and my course at Black Hat USA, and a few seats were added in this previously *sold-out* class!   Learn the basics of #OSINT, @hak5 #BashBunny & #WiFiPineapple, and how to build a successful...

How To Determine What Your New DEF CON Group’s DCXXXX Number Will Be

DEF CON Groups

(Reprinted from https://defcongroups.org) As the DEF CON Groups Signaler (handling group communications), I wrote this to help all new DEF CON Groups community leaders in determining what their group name will be. ——————- How To...
« Older Entries
Next Entries »
Fixing An Insecure Software Life Cycle - Practical Techniques for Building Security Into Existing Software Development Programs
By April C. Wright

Fixing an Insecure Software Life Cycle Cover
Follow @aprilwright
Black Hat USA 2020 Trainer Banner

Recommended Gear:

Search

Recent Posts

  • 31 Days of Security Awareness in #DevSecOps – DAY 22 by Alyssa Miller
  • What Are My Photos Revealing About Me? You may be accidentally sharing personal information in your photos (an important Guest Post)
  • If I Go to a Protest, What Kinds of Personal Information Might Police Collect About Me? (important guest post)
  • New talk posted to my media page!
  • I’m quoted in CSO Online article: 25 API Security Tips You’re Probably Not Considering

Tags

Android Apple Boston business career Cats centralized secrets Defense devil's advocate enterprise female Hak5 Hostile Networks infosec International Travel interview iOS ipad iphone ISSA keys MacOS media Mobile Devices New England organizations passwords Personal Security privacy Protect my devices Protect yourself quotes Recommendations security issues smartphone Social Engineering Software tablet Talks Tips Travel Traveling Abroad Travelling abroad Windows Mobile women
Tweets by aprilwright

Search

Follow @aprilwright
  • Facebook
  • Twitter
  • RSS