What you Should Know as a User about GDPR?

I am sure you received plenty of emails about the new regulation in the European Union called GDPR or General Data Protection Regulation. It is now recognised as law across the EU under 2016/679. The European Union is a leader in privacy and data protection of its citizens, and it pushes big companies to comply…

Nidhal Guessoum: Islam, Science and The Next Phase Of Debates

The debate of Islam and Science involves multiple disciplines and multiple thinkers from different schools of thoughts. It is perceived from various angles from the perennialist philosophy with Sayyed Hossein Nasr to secular modernism with Pervez Hoodbhoy, to Islamic ethical science with Muhammad Abdus Salam, universalist science and the Islamization of knowledge with Ismail R….

How DDos can be used to make money?

I have been investigating the impact of the Memcached DDos Attacks which are largely used today against servers, especially after taking down Github by 1.7 Tbps DDos Attack which is the largest DDos Attack ever. Hackers use vulnerable Memcached servers to lunch a DDos attack to take down servers by sending forged UDP packets on…

Irregular Thoughts on Deep Web

I have been reading many articles that tackeled the topic of deep web especially in Arabic. And I noticed that it became a “fancy” topic to attract people’s curiosity. However, they lack the sound technical understanding of the matter. I know some of you would think that I should write this post in Arabic since…

Please, Linux is NOT an operating system!

“The system as a whole is basically the GNU system, with Linux added. When you’re talking about this combination, please call it “GNU/Linux”.” Richard Stallman I am writing this post because I see in almost everywhere people talking about Linux as an operating system. Linux is NOT an operating system. One day my rommate told…

An Overview of Anti-Forensics Techniques

   Protecting the sensitive data of a government or data protection in general has become, nowadays, a great challenge that faces the security architects around the world. The Moroccan government faced last year a lot of attacks from different parts. However, the  famous one is the “Leaks” of “Chris Coleman” who shared  some sensitive documents in…

Hackers are free people, just like artists!

For the third world countries, hackers are criminals regardless of how ethical they are. Hackers are not legally protected. They are treated as unwanted creatures who work against the country. For Morocco, hackers have been building a strong reputation around to globe as intelligent people who discovered bugs in famous platforms and attacked individuals or…

How Security Became Digitized?

Nowadays, cyber security has become equivalent to physical security. If a cyber criminal steals your passwords or your credits cards, it is as if he steals your keys or your wallet in the street. The problem with the internet is that the “wallet” is shown to everyone. It can be seen by all users, and…

Privacy from a Moroccan Perspective

In 2015, an Italian company that sells hacking software such as Trojans and malwares was hacked by an anonymous team and leaked about four hundred gigabytes of data. Surprisingly, the leaked data contained the amount of money that Morocco spent on buying spyware from HackingTeam company. The Moroccan intelligent services spent around 3 million euros…

Cyber Security.. A Short History

Science is a differential equation. Religion is a boundary condition. – Sir. Alan Turing  ​Cyber security has become one of the hot topics that are discussed nowadays in different media. In the last five years, many articles were written about hackers that were arrested or banks that were attacked just with viruses and malwares. The…

Editorial of “Problem C – Omar the Bus Driver” in CodeIT 2017

I proposed a problem called “Problem C – Omar the Bus Driver” which was on Scorify platform, and I would like to share its solution in this post. I am not that happy about it because the problem statement was ambiguous, and some cases were not consistent even if they will not change the output….