Protecting the sensitive data of a government or data protection in general has become, nowadays, a great challenge that faces the security architects around the world. The Moroccan government faced last year a lot of attacks from different parts. However, the famous one is the “Leaks” of “Chris Coleman” who shared some sensitive documents in social media. In order to avoid such attacks, this paper … Continue reading An Overview of Anti-Forensics Techniques
For the third world countries, hackers are criminals regardless of how ethical they are. Hackers are not legally protected. They are treated as unwanted creatures who work against the country. For Morocco, hackers have been building a strong reputation around to globe as intelligent people who discovered bugs in famous platforms and attacked individuals or groups who are against the country. They build an unofficial … Continue reading Hackers are free people, just like artists!
Nowadays, cyber security has become equivalent to physical security. If a cyber criminal steals your passwords or your credits cards, it is as if he steals your keys or your wallet in the street. The problem with the internet is that the “wallet” is shown to everyone. It can be seen by all users, and if an attacker has access to your online accounts, your … Continue reading How Security Became Digitized?
In 2015, an Italian company that sells hacking software such as Trojans and malwares was hacked by an anonymous team and leaked about four hundred gigabytes of data. Surprisingly, the leaked data contained the amount of money that Morocco spent on buying spyware from HackingTeam company. The Moroccan intelligent services spent around 3 million euros on spyware to control the flow of information between Moroccans … Continue reading Privacy from a Moroccan Perspective
Science is a differential equation. Religion is a boundary condition. – Sir. Alan Turing Cyber security has become one of the hot topics that are discussed nowadays in different media. In the last five years, many articles were written about hackers that were arrested or banks that were attacked just with viruses and malwares. The last attack was called Petya, and it is a well-implemented … Continue reading Cyber Security.. A Short History
I proposed a problem called “Problem C – Omar the Bus Driver” which was on Scorify platform, and I would like to share its solution in this post. I am not that happy about it because the problem statement was ambiguous, and some cases were not consistent even if they will not change the output. I checked this point after the requests in clarifications because … Continue reading Editorial of “Problem C – Omar the Bus Driver” in CodeIT 2017
I proposed a problem called “Problem A – Mehdi and the Box” which was on Scorify platform, and I would like to share its simple solution in this post. I am very happy because it was a clear and all the contestants solved it. And the hero was my friend Mehdi Laziri. So, this problem was a gift for him. Problem Statement: Mehdi is a smart … Continue reading Editorial of “Problem A – Mehdi and the Box” in CodeIT 2017