Skip to content

Justin Pineda

Cybersecurity • Education • Practice

  • Home
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
    • Web Application Security
    • OSINT
    • IT Audit
    • Threat Analysis and Detection
    • Cryptography
  • About

Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA?

Featured

Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA?

Posted on 29 Dec 202319 Jun 2025 by Justin PinedaIn Academic, Blogs, privacy3 Minutes Read

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Featured

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Posted on 7 Jun 202114 Aug 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research2 Minutes Read

Security Features that should be present in your PH Financial Service Mobile App

Security Features that should be present in your PH Financial Service Mobile App

Posted on 27 Feb 2024 by Justin PinedaIn Blogs, INFOSEC, privacy2 Minutes Read

Cybersecurity Education Platforms

Cybersecurity Education Platforms

Posted on 4 Jan 20248 Jul 2024 by Justin PinedaIn Education, Information Security1 Minute Read

Can screenshots from messaging apps be used as evidence in Court?

Can screenshots from messaging apps be used as evidence in Court?

Posted on 1 Jan 20241 Jan 2024 by Justin PinedaIn Information Security, privacy, Social issues4 Minutes Read

2022 Philippine Cybersecurity Snapshot

2022 Philippine Cybersecurity Snapshot

Posted on 26 Jun 202226 Jun 2022 by Justin PinedaIn Academic, Blogs, Research2 Minutes Read

Do Not Trust. Verify Every Time: How to Start Zero Trust

Do Not Trust. Verify Every Time: How to Start Zero Trust

Posted on 4 Apr 20224 Apr 2022 by justinpcsIn Blogs, INFOSEC, Lessons, Research4 Minutes Read

A pragmatic approach to ransomware

A pragmatic approach to ransomware

Posted on 26 Mar 2022 by justinpcsIn Blogs, Lessons, Research5 Minutes Read

How to Keep it Private: People, Process and Technology

How to Keep it Private: People, Process and Technology

Posted on 11 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research, Talks7 Minutes Read

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

Posted on 10 Dec 2020 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

How NMAP scan types complement your Vulnerability Scanner

How NMAP scan types complement your Vulnerability Scanner

Posted on 2 Dec 202011 Dec 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research3 Minutes Read

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Posted on 27 Nov 202011 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

Posts navigation

← Older Posts

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Tags

bcp burp suite business school child pornography cyber insurance cybersecurity data-protection data-protection-law data breach data lifecycle data privacy defense in depth diskriminasyon dpa dvwa Education equifax ethical hacking evidence handling exam preparation finance giac gmob google auth gwapt implicit deny INFOSEC investing iso 27001 keepass lastpass least privilege legitimate purpose mfa mobile app development mobile security money national privacy commission nist 800-207 npc owasp password manager pdi people personal-finance personal data inventory philippines pia pineda cybersecurity privacy privacy engineering privacy impact assessment process proportionality qualys ssl labs ransomware sans sase screenshots security security awareness security testing sequencer shopee snapshot social-media social engineering supreme court surveillance survey technology vapt zero trust zta ztn

Powered by WordPress.com.

Powered by WordPress.com.

 

Loading Comments...