Security Features that should be present in your PH Financial Service Mobile App Security Features that should be present in your PH Financial Service Mobile App
Can screenshots from messaging apps be used as evidence in Court? Can screenshots from messaging apps be used as evidence in Court?
Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA? Featured Can a rider taking a photo of a person as proof of delivery be considered a violation of the DPA?
How to Keep it Private: People, Process and Technology How to Keep it Private: People, Process and Technology
How Weak Session Management Lessens Security even with Strong Authentication Mechanisms Featured How Weak Session Management Lessens Security even with Strong Authentication Mechanisms
The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks The Practicality and Danger of Cross-Site Request Forgery (CSRF) attacks
How NMAP scan types complement your Vulnerability Scanner How NMAP scan types complement your Vulnerability Scanner
Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion Bypassing SSL Pinning and Traffic Redirection to Burp Suite using MobSF and Genymotion
Effectively Conducting Networking & Cybersecurity Distance Learning Courses Effectively Conducting Networking & Cybersecurity Distance Learning Courses
Securing the Organization’s IT Assets Amidst COVID-19 Securing the Organization’s IT Assets Amidst COVID-19