MakeUseOf

Fatih Küçükkarakurt-Staff Writer for Security

Fatih Küçükkarakurt

Staff Writer for Security

About Fatih Küçükkarakurt

Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
Someone watching a sporting event with an IPTV device 1
Is IPTV Safe to Use?

Internet Protocol Television is tempting, but is it actually safe for you to use? Here are the security risks you need to know about.

A Linux terminal built with ASCII art 1
What Is the ASCII Table and How Do You Use It?

If you ever have the need to work with ASCII values, a lookup table is essential.

A blogger who cares about her personal computer security 1
How to Keep Your Blog Secure: 5 Cybersecurity Tips for Bloggers

Every site owner has a responsibility to readers and to themselves to keep blogs and data secure. Fortunately, that's easier than it sounds.

Someone using a PlayStation 5 controller 1
Can a Jailbroken PS4 or PS5 Be Hacked?

Jailbreaking a PlayStation may be tempting, but it usually does more harm than good.

keychain airtags on the table 1
How Do You Know if an AirTag Is Tracking You?

AirTags can be a major convience, but they can also secretly transmit your location. Here's how you can tell.

Expert trying to decrypt an encrypted data 1
How Do Networks Store Your Passwords and Other Login Information?

The kind of password you should create has a lot to do with how the password is stored.

a padlock on a computer keyboard 1
How to Create a Self-Signed Certificate With OpenSSL

Show visitors to your site that you take their security seriously by creating your own SSL certificate using OpenSSL.

electronic devices protected by a chain lock 1
How to Use KeePassXC to Secure Your Passwords

KeePassXC is one of the safest way to manage your passwords, without the risks of storing your credentials online.

A laptop showing google's homepage with chrome 1
Is Google Chrome Listening to You?

Google Chrome is the most widely used web browser, but is it secretly listening to its users?

a CPU image of computer hardware 1
How Do Buffer Overflow Attacks Work? Going Behind-the-Scenes as a Hacker

Hackers can take control of a system by maxing out a service's storage capacity. So how do hackers carry out such buffer overflow attacks?

a microSD card used to secure the computer 1
How to Make Your Devices Safer Using Glitter Nail Polish

It might sound strange, but do you know you can use glitter nail polish to increase your device’s security?

A female user printing out 1
Machine Identification Codes: Why Your Printer Could Be a Privacy Risk

Agencies might actually be able to trace you via anything you print off. Here's how and what you can do about it.

a smartphone screen showing some mobile apps 1
How to Keep Your Android Phone Safe Using Private Lock

This handy Android app means you can lock your phone's screen if it's ever snatched by thieves, friends, or even family members!

Comparison operators and boolean logic with cpp 1
Be Careful Comparing Numbers in C++

If you’re coming to programming from a mathematical background, this subtle detail can easily catch you out.

Exterior view of Eldorado Arcade, one of its existing venues in the series 1
What Can You Learn About Cybersecurity From the Mr. Robot TV Series?

Mr. Robot stars Rami Malek as hacker, Elliot Alderson. But how realistic is it? What can viewers learn about fighting hackers from the TV show?

A hacker who monitors botnet devices 1
How to Detect and Mitigate Botnet Attacks

Botnets can be difficult to detect, but can cripple your system and mean you're unknowingly aiding a hacker. Here's what you need to know.

A faceless hacker who cares about his privacy 1
Safe Surfing Techniques: How Do Hackers Make Sure They Stay Safe Online?

For hackers, staying anonymous is part of the job description. There is much we can learn from their behavior about staying private and secure online.

A woman with binary codes describing artificial intelligence 1
Is It Possible to Use Artificial Intelligence for Penetration Tests?

Can artificial intelligence tell you about a program's vulnerabilities? Perhaps, but you may not want to put all your faith in what it says.

ubuntu-servers-network-configurations 1
How to Configure Networking on Ubuntu Servers

Without a network connection, a server can't function. Here's what you need to know to configure networks on Ubuntu from the command line.

An attacker with a clickjacking attack 1
Here’s Why You Might Be Sharing Your Camera With a Cyberattacker

A hacker might be spying on you via your webcam and microphone. And you allowed them that access. Here's how.

1 2 3 4
Page 1 / 4