Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Credit: Taken from https://www.mobistealth.com/blog/facebook-spy-tool-lets-read-messenger-conversations/  (First released in September 2016) Abstract— Facebook (FB) is one of the most popular social networking sites all over the world. According to Zephoria, there are approximately 1.71 billion FB users worldwide as of July 2016. There are 4.75 billion contents that are shared daily which include status posts, notes, images, … Continue reading Exploring the Security Issues behind Facebook’s User Tracking from its ‘Big Data’ for Competitive Intelligence

Tips and Reasons: A Career in Cybersecurity

Is there a career in IT Security/Cybersecurity in the Philippines? – This is the question that is always asked when I give workshops or lectures in the academe. I always answer an astounding “yes.” Here are the reasons why: Reason #1: There is a need for cybersecurity professionals because of the increasing number of cybercrimes … Continue reading Tips and Reasons: A Career in Cybersecurity

4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

COMING from the business side, I have met and seen various vendors who promise heaven and earth to answer IT problems in your organization. There are the ‘yes’ guys who will always answer ‘yes’ when you ask if the solution can do this or that. There are the ‘deflectors’ who try to confuse or worse, … Continue reading 4 Reasons Why All-In-One/Automated Penetration Testing is a Fallacy

Proud of my students’ achievements @ UA&P event

Last February 24, 2017, me and my undergraduate students went to the University of Asia and the Pacific (UA&P) in Pasig City to present their project Hydra in a school-initiated research conference. The event was not very big but various students from undergrad to PhD were prepared to present their papers. I was really pushy … Continue reading Proud of my students’ achievements @ UA&P event

Presented at the 14th NCITE and toured Dipolog City 2016

It was my first time to submit a research paper in a national conference. In the academe, getting support is a challenging task because you need to convince the admin that the paper you will be presenting is worth the expenses. I'm happy that my boss, the dean of the school was supportive of this initiative. The research … Continue reading Presented at the 14th NCITE and toured Dipolog City 2016

COMSEC2 Vulnerability POC and Analysis

For COMSEC2, the project of the students is to simulate and existing vulnerability (it can be application, network etc.) and create an analysis based from research. The ultimate goal is for the students to come up with an outlook of the vulnerability on how it has affected and will affect the computing world in the … Continue reading COMSEC2 Vulnerability POC and Analysis

Machine Project in Infosec

Objectives ■To be able to configure, implement an open-source security tool. ■To simulate a real-world attack scenario where the security tool can be used. ■To show how to configure necessary functionalities of the security tool. Tasks ■Each group will be assigned a specific security tool. Each group will research about the topic and download an … Continue reading Machine Project in Infosec