About Fatih Küçükkarakurt
Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.
Is IPTV Safe to Use?
Internet Protocol Television is tempting, but is it actually safe for you to use? Here are the security risks you need to know about.
What Is the ASCII Table and How Do You Use It?
If you ever have the need to work with ASCII values, a lookup table is essential.
How to Keep Your Blog Secure: 5 Cybersecurity Tips for Bloggers
Every site owner has a responsibility to readers and to themselves to keep blogs and data secure. Fortunately, that's easier than it sounds.
Can a Jailbroken PS4 or PS5 Be Hacked?
Jailbreaking a PlayStation may be tempting, but it usually does more harm than good.
How Do You Know if an AirTag Is Tracking You?
AirTags can be a major convience, but they can also secretly transmit your location. Here's how you can tell.
How Do Networks Store Your Passwords and Other Login Information?
The kind of password you should create has a lot to do with how the password is stored.
How to Create a Self-Signed Certificate With OpenSSL
Show visitors to your site that you take their security seriously by creating your own SSL certificate using OpenSSL.
How to Use KeePassXC to Secure Your Passwords
KeePassXC is one of the safest way to manage your passwords, without the risks of storing your credentials online.
Is Google Chrome Listening to You?
Google Chrome is the most widely used web browser, but is it secretly listening to its users?
How Do Buffer Overflow Attacks Work? Going Behind-the-Scenes as a Hacker
Hackers can take control of a system by maxing out a service's storage capacity. So how do hackers carry out such buffer overflow attacks?
How to Make Your Devices Safer Using Glitter Nail Polish
It might sound strange, but do you know you can use glitter nail polish to increase your device’s security?
Machine Identification Codes: Why Your Printer Could Be a Privacy Risk
Agencies might actually be able to trace you via anything you print off. Here's how and what you can do about it.
How to Keep Your Android Phone Safe Using Private Lock
This handy Android app means you can lock your phone's screen if it's ever snatched by thieves, friends, or even family members!
Be Careful Comparing Numbers in C++
If you’re coming to programming from a mathematical background, this subtle detail can easily catch you out.
What Can You Learn About Cybersecurity From the Mr. Robot TV Series?
Mr. Robot stars Rami Malek as hacker, Elliot Alderson. But how realistic is it? What can viewers learn about fighting hackers from the TV show?
How to Detect and Mitigate Botnet Attacks
Botnets can be difficult to detect, but can cripple your system and mean you're unknowingly aiding a hacker. Here's what you need to know.
Safe Surfing Techniques: How Do Hackers Make Sure They Stay Safe Online?
For hackers, staying anonymous is part of the job description. There is much we can learn from their behavior about staying private and secure online.
Is It Possible to Use Artificial Intelligence for Penetration Tests?
Can artificial intelligence tell you about a program's vulnerabilities? Perhaps, but you may not want to put all your faith in what it says.
How to Configure Networking on Ubuntu Servers
Without a network connection, a server can't function. Here's what you need to know to configure networks on Ubuntu from the command line.
Here’s Why You Might Be Sharing Your Camera With a Cyberattacker
A hacker might be spying on you via your webcam and microphone. And you allowed them that access. Here's how.