Below is the link to presentation slides that were used in my recent seminar regarding security and privacy in web applications, mobile application and the cloud.

IT, Security, Politics & Life
Below is the link to presentation slides that were used in my recent seminar regarding security and privacy in web applications, mobile application and the cloud.
Wispotter is the main WIFI provider at Sabiha airport, in Istanbul, Turkey. It also provides various networking services within Turkey I believe. Wispotter is not GDPR compliant and should be banned from providing services to EU citizens. This article explains why.
A while ago, Mozilla released its Facebook Container Extension in an attempt to protect user’s privacy on the web. Months later, the extension became quite mature and is ready to be adopted on a mass scale.
In this article, I will be explaining how Facebook tracks our activity, how our privacy can be protected and how we can use this extension to regain our privacy.
Read the article at intouch blog.
Parents might not be aware of how their children’s privacy is affected online. This covers newborn babies, infants and older children up till the age of maturity.
For newborn babies and infants, parents can commit severe mistakes that might affect their children’s lives forever. For older children, the children themselves can do this mistake simply for not being aware of how privacy can be abused by others. It is the role of parents to protect their children’s privacy by teaching them and guiding them.
Read the full article at intouch blog.
I had an introductory lecture regarding the Blockchain and its usage in cryptographic tokens and smart contracts. The lecture took place at Notre Dame University, Main Campus in Zouk Mosbeh. The slides of the presentation can be found here. A video showing the slides and the presentation is also available under my YouTube channel and can be viewed here.
Facebook has admitted that around 40 million user accounts were hijacked and insists that the breach was accomplished using a series of related bugs. The truth is that this attack used plain old techniques that the majority of modern frameworks has built-in protection against.
Read the full article on intouch blog.
One of the hottest topics after any elections that take place in Lebanon is which party received the highest number of supporters from the Christian community. This topic normally takes months and months of arguments among parties and can easily become the source of a huge conflict in many topics within the upcoming four years.
This year, I decided to take the task of nailing down all numbers, grouping them, calculating totals and averages right when the elections finished with fresh numbers and figures still available.
Up until this day, all previous and current Lebanese governments and parliament members have failed to put in place a national standard for digital signatures. The process is not hard, not vague, not tedious and – for sure – not dangerous. Digital Signatures are already approved as national standards in all digitally-active countries except in Lebanon despite the fact that Lebanon is a digitally-active country.
Read moreIn this article, I will tackle the HeartBleed bug that spread the news lately as well as what should normal website users be aware of by mentioning what could be affected and how to protect it.
Just as in the book series “… For Dummies”, this post is meant to introduce the concept of authentication, authorization and access control for non-technical readers.
To start with, a simple principle needs to be introduced and highlighted: Security principles in IT are exactly the same as those in real life. By understanding this simple statement, you will be able to understand all IT security principles in a very easy manner.
Read more