About Fatih Küçükkarakurt
Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.
Latest Articles
Telegram Is Full of Scam Bots, and This Is How to Avoid Them
Telegram is great for instant messaging, and its bots are extremely useful, but you should beware of unexpected data risks.
How to Encrypt Email Sent in Microsoft Outlook
Your email is mostly secure, but you could make it so much safer.
What Is a Cold Boot Attack and Can You Defend Against It?
When you flick the switch on your computer off, it takes the data stored in your RAM with it, right? Don't be so sure.
6 Minimalist Cybersecurity Tips You Can Implement Right Now
Less presence means less footprint, which makes you safer online and with less digital maintenance. What's not to love?
The 6 Most Important Programming Languages for AI Development
With the right programming language in hand, it's easier to work your way through the complex world of AI development.
Can Your Computer Be Accessed Remotely While It’s Off?
Can a hacker get into your PC when it's powered down? Yes, it's possible; fort instance, using Intel's Active Management Technology...
5 Ways to Learn HTML and CSS With Real UI Challenges
Follow these strategies to unlock your web development skills with interactive learning, creative challenges, and practical experience.
What Is Half-Duplex and Full-Duplex and How Does It Affect Your Router?
Wi-Fi and communication are shaped by duplexing. But what is duplexing, and how does it affect your communication?
An Introduction for Parents Talking to Children About Online Safety
How do you keep kids safe online? It's a tricky thing to master, so here's a guide to approaching cybersecurity with your youngsters.
VB.NET SQL Examples for Querying Databases Efficiently
Discover how to issue the most common SQL commands using VB.NET.
An In-Depth Introduction to DDOS Defense Strategy: How to Protect Against Botnet Attacks
When many machines target your site or servers, your systems can all come crashing down. You need a plan.
How to Configure Static IP Address on Ubuntu 22.04 LTS and 22.10
Switching from dynamic IP allocation to static IP addresses is easy on Ubuntu 22.04 "Jammy Jellyfish" and 22.10.
Is Mobile Hacking Still a Big Threat in 2023?
We all try to protect our laptops and PCs from hackers, but are our smartphones also at risk?
How to Use ARIA (Accessible Rich Internet Applications) in HTML and CSS
Small tweaks to your HTML can bring large benefits to your readers.
Why Digital Car Keys Are Not Safe and Secure
Some car manufacturers allow you to unlock and start your vehicle using your phone, but is that safe? Can digital car keys be hacked?
What Is SIEM and How Can You Use It to Optimize Your Security?
Keeping track of security threats and flaws is difficult. That's why you need Security Information and Event Management.
A Beginner's Guide to Supervising Access to Computer Systems
Computer systems store a lot of important data, so how is such information actually kept secure? It ultimately comes down to who you give access to...
Yes, AI Can Crack Your Password, but Can You Prevent It?
Artificial intelligence can be used to crack your passwords: here's how it works and how you can protect yourself from the AI threat.
Ethical Hacking: What Are the Stages of Penetration Testing?
How do cybercriminals hack into systems? How can you protect against them? Ethical hackers can show you via pentests.