Below is the link to presentation slides that were used in my recent seminar regarding security and privacy in web applications, mobile application and the cloud.Read more
Wispotter is the main WIFI provider at Sabiha airport, in Istanbul, Turkey. It also provides various networking services within Turkey I believe. Wispotter is not GDPR compliant and should be banned from providing services to EU citizens. This article explains why.Read more
A while ago, Mozilla released its Facebook Container Extension in an attempt to protect user’s privacy on the web. Months later, the extension became quite mature and is ready to be adopted on a mass scale.
In this article, I will be explaining how Facebook tracks our activity, how our privacy can be protected and how we can use this extension to regain our privacy.
Parents might not be aware of how their children’s privacy is affected online. This covers newborn babies, infants and older children up till the age of maturity.
For newborn babies and infants, parents can commit severe mistakes that might affect their children’s lives forever. For older children, the children themselves can do this mistake simply for not being aware of how privacy can be abused by others. It is the role of parents to protect their children’s privacy by teaching them and guiding them.
I had an introductory lecture regarding the Blockchain and its usage in cryptographic tokens and smart contracts. The lecture took place at Notre Dame University, Main Campus in Zouk Mosbeh. The slides of the presentation can be found here. A video showing the slides and the presentation is also available under my YouTube channel and can be viewed here.
Facebook has admitted that around 40 million user accounts were hijacked and insists that the breach was accomplished using a series of related bugs. The truth is that this attack used plain old techniques that the majority of modern frameworks has built-in protection against.
Read the full article on intouch blog.
Up until this day, all previous and current Lebanese governments and parliament members have failed to put in place a national standard for digital signatures. The process is not hard, not vague, not tedious and – for sure – not dangerous. Digital Signatures are already approved as national standards in all digitally-active countries except in Lebanon despite the fact that Lebanon is a digitally-active country.Read more
In this article, I will tackle the HeartBleed bug that spread the news lately as well as what should normal website users be aware of by mentioning what could be affected and how to protect it.Read more
Just as in the book series “… For Dummies”, this post is meant to introduce the concept of authentication, authorization and access control for non-technical readers.
To start with, a simple principle needs to be introduced and highlighted: Security principles in IT are exactly the same as those in real life. By understanding this simple statement, you will be able to understand all IT security principles in a very easy manner.Read more
Yesterday, I gave a seminar entitled “Ethical Hacking: It’s All About the Ethics”. What I really enjoyed about the seminar was the amount of interest that the topic had on students as well as the questions asked during and after the seminar.