Saturday, January 30, 2021

Review of California Consumer Privacy Act (CCPA) and the amendment of California Privacy Rights Act (CPRA)

California Consumer Privacy Act (CCPA) became effective on 1st of January 2020 enhancing the privacy rights and consumer protection for the Californian residence of the United States. This was a significant advantage for consumers worldwide as well. Tech giants such as Google and Facebook are established in the state of California and are entitled to adhere to the new consumer protection laws. This is believed to have similar effects as GDPR, giving more power to the consumer. In addition on November 3, 2020, the California Privacy Rights Act (CPRA) was passed by Californian voters. This would amend CCPA by establishing a new privacy enforcement agency that posses the jurisdiction to implement and enforce the CCPA.

First, we will take a look at CCPA and then explore the new add on through CPRA. I will do a comparison of GDPR as we discuss the topic.


Wednesday, January 20, 2021

GDPR (General Data Protection Regulation) Essentials

Consider as one of the world's most strict privacy and security laws, GDPR was put into effect on 25th May 2018 as European union regulation. What’s significant about  GDPR is that even when your company is not established in the European Union but you provide goods or services for the citizens of the EU you are entitled to follow these laws. If a company violates GDPR the data subject who are customers or site visitor whose data is being processed can demand compensation. The accused should pay a fine which maxes out 4% of their annual global turnover or 20 million Euros (whichever is the highest).






Sunday, January 17, 2021

Importance of post-authentication intruder detection systems in mobile and computer security



There are billions of mobile phones and computers in use globally. The value of these devices cannot be measured only by their retail price. They hold invaluable data of individuals, organizations, military, and governments. Therefore, the security of these devices should not be limited to authentication and authorization mechanism. Post authentication techniques to detect intruders are an absolute necessity in these systems.

Thursday, October 15, 2020

PHP Short note part 2 (Conditional statements, Loops, Functions, Arrays)

This is a quick read on Conditional statements, Loops, Functions, and Arrays. I've created this short note to help anyone who wants to refresh their PHP knowledge. And for people who are new to PHP but have some knowledge in programming can also benefit from this article.

Conditional Statements

This is used to make choices based on the conditions given.

Friday, October 9, 2020

PHP Short Note Part 1 (PHP Basics)

This is a short note that I created to refresh my memory on for the introduction to PHP and I hope to continue while I keep learning more about this serve side scripting language. 

PHP also is known as Hypertext Pre Processor code executes on the server and the results return to the browser as plain HTML. The PHP files should have a “.php” extension. PHP can generate dynamic page content which allows the server to generate unique content each time the page is loaded. PHP can perform many tasks on files such as open, read, write, create, close files in the server as well as add delete, modify data in the database. It is also used to control user access and encrypt data. 

Wednesday, October 7, 2020

SQL injection Demo PART 1 Union Based

In this article, I’m going to use the burp suite community edition tool to exploit some SQL Injection vulnerabilities. I’m using Port Swigger academy labs for this demonstration

The first one is a simple retrieval of hidden data. Following is a webpage that retrieves data from a SQL database. In the URL we can see the Gifts parameter is assigned to “category”. But there’s a hidden variable called “released” as well.

SQL Injections Short note

Injections are ranked as the number one web application vulnerability by OWASP top 10. Injection  flaws can be stimulated by an intruder sending malicious data to the interpreter. In this article I will be talking about the SQL Injections in particular.


Review of California Consumer Privacy Act (CCPA) and the amendment of California Privacy Rights Act (CPRA)

California Consumer Privacy Act (CCPA) became effective on 1st of January 2020 enhancing the privacy rights and consumer protection for the ...