Skip to content

Mover and Shaker

In between traffic and disruptive technology

  • Home
  • Courses
    • Information Security
      • Module 1: General Security Concepts
      • Module 2: Operational & Organizational Security
      • Module 3: Legal Issues
      • Module 4: Privacy and Ethics
      • Module 5: Infrastructure Security
      • Module 6: Cryptography
      • Module 7: Public Key Infrastructure
      • Module 8: Physical Security
      • Module 9: Types of Attacks and Malware
      • Module 10: Security Operations and Baselining
    • Ethical Hacking
      • Module 1: Introduction to Ethical Hacking
      • Module 2: System Fundamentals
      • Module 3: Popular Attacks and Vulnerabilities
      • Module 4: Reconnaissance
      • Module 5: Scanning
      • Module 6: Gaining Access
      • Module 7: Maintaining Access and Covering Tracks
      • Module 8: Reporting
    • Cybersecurity Defense
      • Module 1: Risk Management
      • Module 2: Business Continuity
      • Module 3: Legal Investigation
      • Module 4: Computer Forensics
      • Module 5: Security Operations Center
    • Web Application Security
  • About
  • Welcome!

Security Features that should be present in your PH Financial Service Mobile App

Security Features that should be present in your PH Financial Service Mobile App

Unknown's avatar
Posted on 27 Feb 2024 by Justin PinedaIn Blogs, INFOSEC, privacy2 Minutes Read

Cybersecurity Education Platforms

Cybersecurity Education Platforms

Unknown's avatar
Posted on 4 Jan 20248 Jul 2024 by Justin PinedaIn Education, Information Security1 Minute Read

Can screenshots from messaging apps be used as evidence in Court?

Can screenshots from messaging apps be used as evidence in Court?

Unknown's avatar
Posted on 1 Jan 20241 Jan 2024 by Justin PinedaIn Information Security, privacy, Social issues4 Minutes Read

Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA?

Featured

Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA?

Unknown's avatar
Posted on 29 Dec 2023 by Justin PinedaIn Academic, Blogs, privacy3 Minutes Read

2022 Philippine Cybersecurity Snapshot

2022 Philippine Cybersecurity Snapshot

Unknown's avatar
Posted on 26 Jun 202226 Jun 2022 by Justin PinedaIn Academic, Blogs, Research2 Minutes Read

How to Keep it Private: People, Process and Technology

How to Keep it Private: People, Process and Technology

Unknown's avatar
Posted on 11 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research, Talks7 Minutes Read

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Featured

How Weak Session Management Lessens Security even with Strong Authentication Mechanisms

Unknown's avatar
Posted on 7 Jun 202114 Aug 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research2 Minutes Read

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks

Unknown's avatar
Posted on 10 Dec 2020 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

How NMAP scan types complement your Vulnerability Scanner

How NMAP scan types complement your Vulnerability Scanner

Unknown's avatar
Posted on 2 Dec 202011 Dec 2021 by Justin PinedaIn Academic, Blogs, Lessons, Research3 Minutes Read

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion

Unknown's avatar
Posted on 27 Nov 202011 Dec 2021 by Justin PinedaIn Blogs, Lessons, Research3 Minutes Read

Effectively Conducting Networking & Cybersecurity Distance Learning Courses

Effectively Conducting Networking & Cybersecurity Distance Learning Courses

Unknown's avatar
Posted on 5 Jun 202011 Dec 2021 by Justin PinedaIn Academic, Blogs, Lessons, Talks4 Minutes Read

Securing the Organization’s IT Assets Amidst COVID-19

Securing the Organization’s IT Assets Amidst COVID-19

Unknown's avatar
Posted on 29 Apr 202011 Dec 2021 by Justin PinedaIn Blogs, INFOSEC, Research5 Minutes Read

Posts navigation

← Older Posts

Preparing a Data Privacy Compliant Organization

https://www.youtube.com/watch?v=fGlbwHDR4oU&t=1s

Tags

acunetix apc seminar vulnerabilities indsutry daniel suarez burp suite business continuity bypass ssl pinning ccs week covid-19 cspc nabua bicol youth congress csrf cybersecurity cybersecurity career cybersecurity education data privacy diskriminasyon distance learning dpa dvwa ethical hacking exam preparation frida genymotion giac gmob gwapt high demand hydra information security INFOSEC infosec FUS model formula IT certification IT security low supply malware mensrea mobile security mobsf nessus networking education network security nmap online learning owasp pamantasan ng lungsod ng pasig patts pci-dss penetrationtesting pinedacybersecurity poc port scan privacy remote work research conference sans scan type secure web application coding workshop bancnet bitshield security awareness security mechanisms security services security testing sequencer skills gap social engineering surveillance teaching technology token vapt version scan vulnerability management vulnerability scan web goat websecurity wfh wireshark work from home

Blog at WordPress.com.

Proudly powered by WordPress | Theme: Carbon by Codestag.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Mover and Shaker
    • Join 29 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Mover and Shaker
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar

Loading Comments...