Pokémon Go Privacy and Security Matters!

Pokemon Go

Pokémon Go game has become so popular in the past few weeks after being launched early this month. According to Recode, technology, and media news website, Pokémon Go has an average of 9.5 million users actively using the game on the daily basis.

With that said in mind and the growing demand on the mobile app, privacy and security of the users have to be considered heavily. Here we’d like to share with you few tips on how to use the game while keeping you safe and secure with the least minimal impact.


Make sure that you’re downloading the app from a trusted source and not a third party to ensure your safety and security i.e. Google Play

With the high demand on the application many third party sources have made the application downloadable from their sites. This could introduce malware and viruses without the users’ knowledge.


Protect your privacy while playing the Pokémon Go

As the application requires access to your GPS location along with your data connection, privacy can be easily invaded.  However, below are few things you could adjust while playing to minimize the risk.

  • Don’t use your personal Gmail account to log in. This links your personal information on the account including your location and the game activity. Instead, you can use a fake account for that matter.
  • Make sure your application is always updated with all the security patches on a regular basis.


Beware of the Pokémon Go-themed Scams

Beware of malicious apps on Google Play store. Researchers from popular firm ESET have spotted at least three fake Pokémon Go apps.  One of which titled “Pokémon Go Ultimate” has posed the biggest threat to Android users according to the research.

Beware of Pokécoins phishing scams. Several sites have been available requesting personal information from individuals in return for gaining Pokécoins and other powerups.


Don’t play the game while biking, driving or even walking

Some accidents have been recently reported and all over the Internet due to people getting distracted with the game while driving.

Getting distracted by the game while driving, biking or even walking could put others’ lives in danger.

Note that if you are drawn to an area that is dangerous or restricted, you can report it to the game’s developer who will consider removing it from the game.


Keep others privacy into consideration

Don’t get carried away with your enthusiasm to Pokémon hunt. Such behavior may lead to several consequences such as privacy invasion i.e. consider your time and place while playing the game.


Review access permission while using the app

The application asks for permission to access your location data, photo library, media files on the device, contacts, and camera. Location data is the only thing you need to allow to play this game. This option will let you play without augmented reality. So if you want to have augmented reality, then you will need to allow the camera as well.





“Texting While Driving” Matters!


In today’s world, while people are constantly glued to their mobile devices, it ‘s hard to believe they communicate like the old days. In the world of technology and social media, people don’t often have face-to-face conversations with each other anymore. They use Facebook, Instagram, Twitter, LinkedIn, Whatsapp, or any other medium that allows them to communicate behind the screen.

Communicating through means of technology doesn’t necessarily affect us negatively, it’s the way we use it.  Technology brings a lot of benefits to the users along with some unknown side effects that we perhaps need to be aware of.

In this blog, I’d like to touch base on how technology can lead someone to end his/ her life or the life of others through the “wrong” use of technology. Improper use can take place through different means such as bullying, addiction, gaming, and many more. But I’d like to shed the light in this blog on “mobile addition”.

“Mobile addiction is the constant use of mobiles despite the adverse effect it can have on a person or others around them.”

One of the very harmful effects mobile addiction can have on a person is “texting while driving”.   Texting while driving is the act of always looking out and replying to messages you receive on your phone while you’re on the road and behind the wheels.  People with this behaviour can lead to many incidents, out of which are the following;

  • getting distracted from driving
  • moving from one lane to another without noticing
  • suddenly finding yourself too close to break

Many of these events can cause harm to you and the life of others.  It only takes a few seconds for an accident to happen; like a person crossing the road,  another driver who happen to be in the next lane,  a huge truck that happened to be parking on the right way, and many more events.

We often need to remember that our lives are more important than the text messages we are replying to or even those we’re communicating with.  What also matters are the people behind us who love us the most in their lives. Our families, friends, and relatives.

Technology can always be an advantage, but we need to remind regularly ourselves of how we should use it to keep it on our side and not against us.

#drivesafe #textingwhiledriving #addiction #onlinesafety #iPledge_not_to_text_while_driving

TED vs. Toastmasters

In TED, speakers talk about what they have written in books and magazines or about their work or contributions to the whole society. That is evident in the following two videos.

What explains the rise of humans? – By Yuval Noah Harari

Design and Destiny – By Philippe Starck

That is right, however, and especially in these two talks what is very evident is that no matter what you come from or what you have to offer, we all do think and believe it’s an added value to come and listen. And this is one thing TED and Toastmasters have in common.

When I think about the differences and similarities of both, I think of both as very similar in nature. Both platforms are for people to think and express their thoughts and ideas freely. You don’t get caught or jailed when you express unusual opinions or views.

From the many talks I’ve watched and listened to, I believe one thing is very uncommon, though. People use TED to share life accomplishments and anticipations of the future while, in Toastmasters, we share life experiences as we face it ( day-to-day ). In Toastmasters, we live the success experience with our audience step by step all the way while, in TED, we come to showcase our light.

Similarly, TED and Toastmasters offer a platform to be persuasive, courageous, funny, ingenious, inspiring, and beautiful.

On the contrary, you never get a proper evaluation in TED, rather you may get harsh criticism as the whole world is evaluating you and maybe that’s one thing that keeps putting them apart.

In conclusion, I think TED and Toastmasters are both there to help the billions bring out their thoughts, ideas, and emotions. They help them get heard.

Your thoughts, please.

Facebook | 5 Steps to Recover and Secure a Compromised Account!

Facebook Recovering Account

The dependency on Facebook and its data has become a vital part of our day to day life.  Most of the people in this generation can not easily live without Facebook ( myself included ).  It has played and is still playing a quite significant role in our businesses and personal lives.

We heavily use Facebook for many reasons, whether we want to talk to family members. Reach out to friends abroad.  Or even run businesses from home.

Facebook has made it quite easy for most of us to communicate with friends and family. Run businesses and advertise for companies. This connection has significantly affected how hackers see Facebook as it has become a significant source of information for millions around the world.

Millions of people provide personal data on their profile. This exposure has affected our security in many different ways and hackers are just looking out to see what we offer ( as a clue ) to hack in.  And we can never avoid hacking and security can never be 100% guaranteed, but we can take the following steps to help keep our account safe and secure on Facebook.

In some cases, however, accounts can be hacked, and a person may find out one day that they can no longer access their profile.  Many reasons could be part of why this can happen, and the consequences can be catastrophic.  They may find people sending out emails, posting pictures, sharing videos, and many other things on their behalf and without their knowledge.  And in some cases, it can be very dangerous and risky to a person’s life and business.

If you found that one day you can no longer access your account, don’t panic and follow the steps below to regain control back to your account.

Step 1:  go to https://www.facebook.com/hacked  and click on “My Account is Compromised”

Step 2: type in your email address, phone number, username or your full name and Facebook will try and match your information with its database to find the associated account.

Step 3: if your account has been hacked most probably the email has been already changed, and you don’t want to notify the hacker that you’re trying to regain control of your account, so click on “No longer have access to these?”

Step 4: now you’re almost there. Write your new email address or phone number which Facebook will use to let you regain control back to your account.

Step 5: Follow the instructions and you shall regain control back within 24 hours.

I hope to see your comments below. Also, you can let me know if you’d like me to write on a particular subject that may have more interest to you and your business.

Stay Safe. Keep Connected.

Sharing Life Learnings


Sharing and learning to share are great acts I think all should practice…


In childhood, we learn the act of sharing but we never really understand its benefit until we grow older and practice it further.  We start to realize the beauty of it. We learn along the way moments of compromise and compassion for one another.  Moments of kindness and gratefulness. This only happens when we start truly practicing LIFE.


Learning about life

In positive attitude &




Life has a lot to offer, and people come with different backgrounds and cultures.  This is how everyone has something unique to offer and share with the great public.  When we start sharing, we teach others different views on life. We help them discover areas of improvement. We let them decide on their path. This helps everyone appreciate every feedback and comment they get along their life-journey.


When we model good sharing in life, we give others a great example to follow.

Sharing has absolutely no restriction on age, color, gender, religion, or where you come from.  It has all to do with your background, experiences, knowledge in life, and your values and principles you stand by.  Hence, we all can.

In my last sharing experience, I had the pleasure of offering some advice to some stranger I met in a conference.  It was about succeeding in Toastmasters and life in general.  I had shared with her my personal view based on my experiences and knowledge.   I had summarized it in what I call the KEY to succeeding.


Keep independent in every step along your journey and don’t wait for someone to do it for you

Educate yourself on your values and principles and stick to them no matter what happens

You’re the most important person in your life so make sure to fight for what you want


Sharing is caring so start the first step and try to make a difference in someone else’s life.  Your experiences and knowledge will only value the moment you start sharing it with others. When we model good sharing in life, we give others a great example to follow.

My Online Reputation is Worth Checking Out

shutterstock_197079635The Internet offers a wide range of information some of which related to people you know, don’t know, relatives, friends, and some are related to you in particular.   This information can be news, events, gatherings, photos, or even personal posts.   It can have great positive impact on you and your beloved ones, but it can also have a great negative impact on your reputation.

In these days, with this great development in science and technology and particularly the Internet, it can take a few clicks to get to know more about an individual.  It can help build a picture of what he or she likes.  Help understand their habits, know their beloved ones or the places they like going to.   As though this could be very helpful to get to know someone easily and fast, it can also prevent an individual from being able to control and protect what people can do with their information online.  They can share it with strangers and people they didn’t want to share this with at the first place.  This can have a dramatic impact on someone’s present and future in some cases.

Though this may seem hard to control with the Internet being open wide for everyone to check at any given time,  yet it can be manageable in a way that put you up in a very good condition to help you build good healthy reputation online.  With a little research, I’ve discovered the following options to start off with in order to get your reputation and the reputation of those who you care about good and healthy on this medium called the “virtual world”.

Search Yourself

Search your name on Google and create “Google alert” on your name to keep track of any content related.  You can have it mailed back to you “automatically”.  This can be done “as it happens”, “once a day”, or even “once a week”.  Choose whatever you like that keeps you aware and doesn’t necessarily overwhelm your inbox with junk you don’t need as some information may not be related at all to you.

N.B.  this is how you can create and manage Google alerts. Follow this link at Salty Dog Interactive.

Get your Domain Name

This is something you may want to consider as buying a domain name that matches your identity online helps keep your profile branding both healthy and reachable as well.  You can have it from places like GoDaddy, JustHost, HostGator, and many more..  This can help you build and keep alive information that you precisely want the public to see.

Keep it All in One

Make sure all your content link back to one place so when people visit your profile on platforms like LinkedIn, Facebook, or any other site they can be directed to your website “myname.com”.  This helps you control and manage what people see and learn about you.

Keep it Private If it’s Private

You really don’t want to share embarrassing photos, posts, or videos even if at some point they may bring laughter.  While moments in life are good to share with friends and family, it may also be as well good to consider thinking of how you’re going to share them before they go viral.

-Better individual for a better society-

How You Can Handle Internet Addiction


In today’s world, the Internet has given us great support for a diversity of reasons and especially to those young men and women, the teenagers.  They use the Internet to do their school assignments. They sometimes use it to play games online, or shop from online stores i.e. amazon, eBay, etc.. It has greatly impacted their lives, and a lot of people have become so dependent on it to an extent they can’t live without it.

–Internet addiction by definition is the compulsive use of the virtual world despite the negative impact it could have on one’s life– HelpGuide.org

While time spent on the Internet can be very productive and efficient, compulsive or uncontrollable use can greatly affect the time we spend with family and friends, gatherings with classmates, and relationship with others.  It can possibly change our day to day activities into a more isolated one.

Why the Internet can be addicting?

It’s there:  It’s always there and you can reach it 24/7 through your computer, phone, tablet, etc..

Something to do: when we get free time, there is always something to be done on the Internet. You can read the news, chat with friends, search for new friends, check your email, watch videos, etc..

It’s comfortable: from home, you can reach all knowledge and information to finish up your work, research projects, and assignments.

You never know what you’ll find: the Internet keeps always updated with all the news and events happening around the globe which you can never feel saturation as it’s endless.

Know what’s going on: all of us use the Internet to be up to date with what’s happening around. It’s one major way to keep close to far friends and relatives, learn updates on the globe, be aligned with today’s trends.

No one knows what you look like: behind the screen you’re physically visible to no one. This for some makes it easier to communicate on a global scale and learn from others what they can’t in real life.

When do you know when addicted?

Losing track of time online: if you spend time online playing games, watching movies, or listening to music, etc.. to an extent you couldn’t remember when was the last time you ate or drank, then perhaps you’re using the Internet too much.

Isolation from family and friends: do you feel that most of the time you’re alone spending the time online, behind the screen with no companion? Is your family and friends life suffering because of your Internet use? Did you miss important events at home or school because of using the Internet?

Feeling defensive about your Internet use:  do you become very defensive when your mother asks you to stop using the Internet to come for dinner or lunch? Does it annoy you when someone asks you to put down your phone when talking to them?

What can you do?

Put time limit: it’s always good to schedule your Internet use throughout the day. This way you can keep track of how long it takes and there you can manage. Let’s say you want to play a game online, put an hour for the game and after that you must take a break and do something else.

Decide what you want: the Internet offers a variety of services. You can do shopping, play games, chat with friends,  and it’s very tempting.  This is why you need to decide what exactly are you looking for and don’t just login to be there.

Find alternatives: as you can find lots of fun stuff to do online, you can find the same and even more offline or in the real world. You can plan a trip with family and friends. You can read a book. You can learn about new cultures through history and heritage. You can visit museums. You only need to look around and I can assure you that you’ll find a lot of stuff to do.

Take breaks: breaks are very important in anything you do. It helps you recover and manage your time better. Make it a habit of taking small breaks in between.


–better individual for a better society–

How We Can Handle Criticism and Rejection


In everyday life, we find people who criticize us for who we’re, how we look like, where we come from, or how we behave. In these criticisms, we sometimes face what is called “constructive criticism” and that has a lot to do with helping us find our weaknesses and looking into ways of avoiding it in future. It also helps us grow as an individual.  On the contrary, we sometimes face what is called “destructive criticism” and that is usually directed toward things we can’t change, and it’s there to hurt than to help. We often find people around us who might tell us we’re wrong, or we look bad, or we’re not as smart as they are, or maybe our hair color and the way we talk are funny, or we’re not as cool. We all have probably experienced that in different shapes and forms, and I think and after years of experience I can confidentially say it all depends on how we look at it or react back to these disapprovals of oneself, whether constructive or destructive. It can either break us into pieces or make us stronger individuals able to face the challenges of today’s world.

In the following paragraphs, I’d like to lay down for you the steps suggested by a book entitled “You Can Handle Criticism and Rejection” written for teenagers by ‘Joe Berry’ from the “Winning Skills Book” series. It highlights some methods or steps that we can take with regards to constructive and destructive criticism and rejection. Dealing with constructive criticism requires the following five steps to help us benefit from it and become better individuals.

  1. Listen carefully while we’re being criticized
  2. Thank the person who has criticized us
  3. Carefully consider the criticism we have received
  4. Decide what you need to do about the criticism
  5. Follow through with whatever we have decided to do

Dealing with destructive criticism requires the following four steps to help us get over it and not to let it take advantage of us.shutterstock_276527114

  1. Let the person who is criticizing us know that his or her destructive criticism is unacceptable
  2. Tell the person who is criticizing us how the criticism makes us feel
  3. Stop listening to the criticism
  4. Put the criticism aside

Feeling rejected can make us feel unloved or unwanted. It can quickly drop down our self-confidence. This can directly impact our performance and activity in our everyday life. It can be minimized by following the below four steps ( as described in the book ).


  1. Remember that we are human beings and, even though we are not perfect, we are still valuable
  2. Remember, it’s the person who rejects us -not us- who has the problems
  3. Avoid being around any people who reject us
  4. Spend time with people who like and appreciate us

It all starts by taking the first step trying to make a difference. It can be tough in the beginning but trust me; it will be very rewarding by the end.

better individual for a better society

Stay Safe While Using Wi-Fi

In today’s world, the Internet has given us several things to do. With all the huge benefit we get online, come online threats that we need to be aware of in order not to fall victim of online criminal activities.   In this article, we wish to raise the level of awareness on some of the used online threats and specifically those that are very much applicable over public or weakly secured Wi-Fi connections, and how we can avoid taken advantage of.

Man In the Middle Attack

Some cafes and restaurants these days have Wi-Fi access, freely available to the public to use for surfing the web and doing other online activities.   Some people use these Internet access methods to login to their banking accounts or do some online shopping.   shutterstock_181796174

While access is freely available to everyone, this includes the bad guys who we call “crackers or hackers” who want to steal your data.  As you login to your bank web site or do online shopping you transmit very important personal data across the network which could possibly be intercepted through what is called “Man in the Middle Attack” or in other words, the person who tries to get between you ( “your computer” ) and the site you’re trying to access. This gives them the right amount of data to capture your online transactions, including your login credentials.

For transmitting personal information online, it’s highly recommended that you login through your private highly secured network, at your premises to avoid such attack.

Evil Twin Attack

As hotels, Internet parks, cafes, and restaurants try to limit access to only their customers, they often create what we call “Internet access” page where the customer is given a code to access with, in order to continue over to the Internet.  This page could possibly be faked by a “cracker” trying to intercept all your traffic data after you’ve successfully accessed the Internet using their page and not the official page of the place you’re staying at.

This usually happens as for a “normal user” it might be little difficult to notice the difference between both pages.

In order to be safe, you need to check with the hotel front desk, the concierge, or the head waiter whether this is the right page to access before you start using the Internet. Or if you’re in a park where the internet is provided ( iPark ), you should contact the call center to verify the authenticity of the page.

War Driving Attack

Now, hackers use their cars along with highly sophisticated hardware and software technology which is widely available in the market to locate wireless networks with weak or no security available in their neighbor.  The moment they’re able to access your network, the easier it will get to intercept all your traffic data including your login credentials and much more personal information about you and your family.

In order to avoid such attack, it’s highly recommended to put on security configuration on your Internet access devices (“routers”) using the technology “WPA2” to securely protect your passwords and data from eavesdropping.


For more information on online safety, please keep in touch with Safe Space website and follow the hashtag on Twitter #safespaceQA.

-stay safe, stay connected-

Live a Happy Ramadan with Adding New Habits!

In this holy IDEAmonth, we start to develop our spiritual world and get closer more to God and religion.  In Ramadan, which is the holiest month of the year, in the Islamic calendar, people start to get together for Iftar gatherings and some special evenings, which we call “Suhoor”.  In such gatherings, we eat and drink and have great conversations with one another.  This is one of the times where people not only get closer religiously but also socially. I also believe that in such wonderful time, people can add new habits to their daily routine in a very simple and easy way to follow.

During the month, people tend to say things like, time is short, couldn’t finish up work, and we can’t get enough sleep, and the list goes on.  For me, I think it’s one of the best times where each individual can take advantage of to get more sleep, and add new good habit to their daily routine if they practice little simple time management strategies and apply it with commitment and a desire to change.

If you’re like most people, you’d love to avoid some silly habits from your daily routine such as watching TV excessively, talking over the phone for hours, or perhaps gazing at your phone trying to keep up with all updates on the social network. However, sometimes you like to add new habits as well which you haven’t experienced before and this when its gets a little interesting.

People say that in 30 days one can learn new habit if they keep doing it every day consistently for 30 days.  I have done it with reading and writing and I think it worked. Everyday at the beginning of the year, January 2015, I decided to write journals to record my day and read a little before I go to bed. By the end of the month, I felt like I’ve learned a new skill and habit, and up till this very moment, am easily able to put myself to read or write anything I like.

We can use the “30 days new habit learning strategy” and apply it with little time-management, commitment and a desire to change to the better in our daily routine during this holy month. What is so special about this month compared to others; is that we all have fixed timing to eat and drink, somehow fixed timing to sleep, and the rest for prayers and reciting Quran.

What I am proposing here is to try to avoid silly habits like drinking lots of coffee, smoking cigarettes, eating loads of sweets, and the list goes on. I am not saying to cut it off in one, but gradually decreasing the intake value ( i.e. two cigarettes a day ) and making sure that by the end of the month we’re not in need for it anymore. On the other hand, we can also start adding new habits such as exercising a little like 15 minutes every day, preferably right before Iftar so we can start eating when we’re in need for protein and carbs.

Share with me your thoughts on the topic if you have more to add, and let me know what you think!

Keep healthy and happy Ramadan everyone!