The literal definition of a Hacker is anybody who uses technology in a way that it wasn’t meant for.This could also be transferred to virtually anything as explained in our previous blog the world of the hacker. When we are referring to the cyber side of hacker culture.What are the 7 types of hackers? • […]
Hacker’s Manifesto. The following was written shortly after my arrest… The Conscience of a Hacker – by – The Mentor – Written on January 8, 1986 Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”… Damn kids. They’re all alike – But did […]
Well there are many attack vectors that cyber criminals can use to acquire access to systems and personal information most of them can be placed into only a few method types. 1. Direct access from brute force attack or DDOS ect (this is when an attacker finds information about your business or personal information online […]
Red Blog First Aid tips that are a Cut above the reat. Travelling and working abroad can be a fantastic opportunity to experience the world and enjoy the lifestyle and Coulter of other locations, however it doesn’t come without risks. We have put together some tips, packing lists and other information to help you prepare […]
Covering all the blogs so far we have extracted the main information to help you put together the best possible equipment skills and common sense to turn you into a hard target for cyber crime and physical attack. We have split this up into different sections. • Everyday carry • Cyber security • Physical security […]
The Red Blog Everyday carry for the frequent traveler As we have covered before https://chasereality.co/upgrade-your-carry-options Having a good everyday carry is paramount to helping fix the issues that life throws at you. That being said some of the items we would normally have with us could be classified as illegal in other countries or restricted […]
The Red Blog We have already covered many reasons why your network is at risk from hackers and cybercrime from DDOS attacks and ransomware however the most common result of system failure is due to the following.• System failure. • Server issues.• Manual errors.• Not updating security protection ie antivirus and firewall protection.• App heavy […]
Red Blog A little about me and a lot about business Welcome everyone.My name is Tim Taylor and I’m the founder of Red Team Consultant’s. Many of you will already be aware of our business from our blogs covering all things security and cyber? How did I get to were we are now? My personal […]
If you are self-employed or freelance working with other companies means you are responsible for managing confidential information and documentation from many clients well acting on behalf of the company be it for consulting or sales roles, you have a duty of care and sometimes legal obligation to keep accurate records from the first point […]
It goes without saying that our grandparents were resilient and strong characters.In this blog we discuss some of the weapons and dirty tricks used by true gentleman looking for ways to defend against pickpockets and street gangs of the time. And from this we can learn how they can quickly be adapted for the modern […]