Speaking Freely: Mohamed El Gohary

After majoring in Biomedical Engineering in October 2010, he switched careers to work as a Social Media manager for Al-Masry Al-Youm newspaper until October 2011, when he joined Global Voices contracts managing Lingua until the end of 2021.
Free speech, for me, freedom of expression, means the ability for people to govern themselves.
It means to me that the real meaning of democracy cannot happen without freedom of speech, without people expressing their needs in different spectrums.
The idea of civic space, the idea of people basically living their lives and using different means of communication for getting things done right through freedom of speech.
Which is, again, going back to freedom of expression.
I think there are ways that are unchartered territories in terms of activism, in terms of platforms online and offline, to maybe reinvent the wheel in a way for people to have a better democratic process in terms of freedom of expression.
There's good civil society and there's bad civil society, in terms of their relationship with both governments and companies.
So it goes back to freedom of expression as a collective and in an individual manner.
It comes to people and freedom of assembly in terms of absolute right and in terms of practice, to reinvent the democratic process.
It turns out it's not just freedom of expression.
Freedom of expression has an important role, and the democratic process can't be reinvented without looking at freedom of expression.
The whole system, democracy, Western democracy and how different countries apply it in ways that affects and creates the power of the rich and powerful while the rest of the population just loses their hope in different ways.
Different governments try to always work together to establish their power structures, while the resources governments have is not always available to civil society.
So it's important for civil society organizations-and IFEX is an example of collaboration between a large number of organizations around the world-in all scales, in all directions, that these kinds of collaborations happen in different organizations while still encouraging every organization in itself to look at itself, to look at itself as an organization, to look at how it's working.
There needs to be the other side of the coin in terms of, again, reinventing the democratic process.
My only frustration is where organizations work as if it is a job, and they only do the minimum, for example.
A bad case scenario is when a civil society organization is working for the government or for private companies-where organizations can be a burden more than a resource.
There is a very small number of people and organizations who would be willing to even think about paying the price of being an inconvenience to organizations that are burdening entities.
There are not a lot of people who would be this kind of inconvenience.
There are many people who appear like they are an inconvenience, but they aren't really.


This Cyber News was published on www.eff.org. Publication date: Tue, 14 May 2024 18:43:08 +0000


Cyber News related to Speaking Freely: Mohamed El Gohary

Speaking Freely: Mohamed El Gohary - After majoring in Biomedical Engineering in October 2010, he switched careers to work as a Social Media manager for Al-Masry Al-Youm newspaper until October 2011, when he joined Global Voices contracts managing Lingua until the end of 2021. Free ...
1 year ago Eff.org
Speaking Freely: Alison Macrina - In the US, I think about power that comes from, not just the government, but also rich individuals and how they use their money to influence things like free speech, as well as corporations. I think the best way that we can use our speech is using it ...
1 year ago Eff.org
#MIWIC2024: Illyana Mullins, Founder of WiTCH - Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim to shed light on the remarkable women in our industry. Overall I consider myself a community specialist when it comes to cyber ...
1 year ago Itsecurityguru.org
Black Basta ransomware made over $100 million from extortion - Russia-linked ransomware gang Black Basta has raked in at least $100 million in ransom payments from more than 90 victims since it first surfaced in April 2022, according to joint research from Corvus Insurance and Elliptic. Over 329 victims ...
1 year ago Bleepingcomputer.com Carbanak FIN7 Qilin Black Basta
Researchers Uncovered Hacking Tools and Techniques Discussed on Russian-Speaking Hacking Forums - Trend Micro researchers noted that these Russian-speaking forums operate with a unique hierarchical structure where established members provide mentorship and technical guidance to newcomers, creating a self-perpetuating ecosystem of cybercriminal ...
4 months ago Cybersecuritynews.com
Feds seek attestation on secure software - The US federal government has released a software attestation form intended to ensure that software producers partnering with the government leverage minimum secure development techniques and tool sets. The form was announced March 11 by the ...
1 year ago Infoworld.com
Meta's 'Pay or Consent' Data Model Breaches EU Law - The EU Commission has informed Meta that its 'pay or consent' model breaches EU law as it does not allow users to freely consent to their personal data being collected for advertising purposes. The Commission's preliminary view is that the tech ...
1 year ago Infosecurity-magazine.com
Prince Ransomware - An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub - Cyber Security News - WithSecure Labs security analysts noted multiple instances of Prince Ransomware-based attacks, including a prominent case in February 2025, when Taiwan’s Mackay Memorial Hospital fell victim to “CrazyHunter” ransomware. This ...
4 months ago Cybersecuritynews.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
1 year ago Eff.org
UAE Cyber Security Council, Khalifa University Launch Abu Dhabi Academy - The United Arab Emirates Cyber Security Council and the Khalifa University of Science and Technology have announced the launch of a Cybersecurity Academy in Abu Dhabi. The Khalifa University Cybersecurity Academy will offer training initiatives to ...
1 year ago Darkreading.com
CVE-2024-54431 - Cross-Site Request Forgery (CSRF) vulnerability in Mohamed Riyaz Admin Customization allows Stored XSS.This issue affects Admin Customization: from n/a through 2.2. ...
7 months ago Tenable.com
CVE-2006-3556 - PHP remote file inclusion vulnerability in extcalendar.php in Mohamed Moujami ExtCalendar 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. ...
6 years ago
CVE-2022-31521 - The Niyaz-Mohamed/mosaic repository through 1.0.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. ...
3 years ago
The Startup That Transformed the Hack-for-Hire Industry - If you're looking for a long read to while away your weekend, we've got you covered. First up, WIRED senior reporter Andy Greenberg reveals the wild story behind the three teenage hackers who created the Mirai botnet code that ultimately took down a ...
1 year ago Wired.com Scattered Spider
UAE Banks on AI to Boost Cybersecurity - For the United Arab Emirates, an aggressive push for a more digitized economy attracted plenty of interest and subsequent investment - but also made it a prime candidate for relentless cyberattacks. With nearly 50,000 cyberattacks reportedly thwarted ...
1 year ago Darkreading.com
North Korean Hackers Weaponizing ZIP Files To Execute Malicious PowerShell Scripts - The LNK file contains embedded code that executes PowerShell commands to extract multiple components: a decoy HWPX document (a Korean document format), executable data files, and a batch script. While the security analyst, Mohamed Ezat from ZW01f ...
5 months ago Cybersecuritynews.com APT3 APT37
DeBackdoor - Framework to Detect Backdoor Attacks on Deep Models - In an era where deep learning models increasingly power critical systems from self-driving cars to medical devices, security researchers have unveiled DeBackdoor, an innovative framework designed to detect stealthy backdoor attacks before deployment. ...
4 months ago Cybersecuritynews.com
Auto-color Linux Backdoor TTPs & Internal Architecture Revealed - When executed with root privileges, Auto-color deploys advanced evasion tactics, including dropping a shared library that hooks libc functions to hide network connections, prevent uninstallation, and ensure its activities remain undetected. A YARA ...
4 months ago Cybersecuritynews.com
Hackers use new IceBreaker malware to breach gaming companies - Hackers have been targeting online gaming and gambling companies with what appears to be a previously unseen backdoor that researchers have named IceBreaker. The compromise method relies on tricking customer service agents into opening malicious ...
2 years ago Bleepingcomputer.com
New Nevada Ransomware Targets Windows and VMware ESXi Systems - A relatively new ransomware operation known as Nevada is quickly growing in capabilities, targeting Windows and VMware ESXi systems. On December 10, 2022, Nevada ransomware was promoted on the RAMP darknet forums, inviting Russian and ...
2 years ago Bleepingcomputer.com
Toronto Public Library confirms data stolen in ransomware attack - The Toronto Public Library confirmed that the personal information of employees, customers, volunteers, and donors was stolen from a compromised file server during an October ransomware attack. According to TPL, the attackers stole "a large number of ...
1 year ago Bleepingcomputer.com Black Basta
Arid Viper Campaign Targets Arabic-Speaking Users - Cybersecurity experts at Cisco Talos have exposed the latest operations of the espionage-driven Arid Viper advanced persistent threat group. The new campaign, active since April 2022, has been targeting Arabic-speaking Android users. According to an ...
1 year ago Infosecurity-magazine.com
SugarGh0st RAT Delivered via Malicious Windows & JavaScript - RATs allow threat actors to execute the following malicious actions while remaining hidden from the victim:-. Recently, cybersecurity researchers at Cisco Talos discovered a malicious campaign that was found to be delivering a new RAT that's been ...
1 year ago Cybersecuritynews.com