MakeUseOf

Fatih Küçükkarakurt-Staff Writer for Security

Fatih Küçükkarakurt

Staff Writer for Security

  • 116
    articles
  • 79
    Features
  • 7
    Lists
  • 30
    Guides

About Fatih Küçükkarakurt

Fatih is a freelance security researcher, penetration tester, and malware analyst. Since 2017, he has been actively working with many different software languages and technologies, especially C, C++, Python, and x86 Assembly. He has reported vulnerabilities of more than 100 large companies. He continues his research as an engineer dealing with operating systems and cloud architecture.

Latest Articles

telegram icon on iphone 1
Telegram Is Full of Scam Bots, and This Is How to Avoid Them

Telegram is great for instant messaging, and its bots are extremely useful, but you should beware of unexpected data risks.

top down view of womens hands on laptop showing outlook logo 1
How to Encrypt Email Sent in Microsoft Outlook

Your email is mostly secure, but you could make it so much safer.

PC motherboard 1
What Is a Cold Boot Attack and Can You Defend Against It?

When you flick the switch on your computer off, it takes the data stored in your RAM with it, right? Don't be so sure.

Woman operating a computer in a dark room 1
6 Minimalist Cybersecurity Tips You Can Implement Right Now

Less presence means less footprint, which makes you safer online and with less digital maintenance. What's not to love?

Two developers watching laptop screen 1
The 6 Most Important Programming Languages for AI Development

With the right programming language in hand, it's easier to work your way through the complex world of AI development.

An Intel CPU with AMT support 1
Can Your Computer Be Accessed Remotely While It’s Off?

Can a hacker get into your PC when it's powered down? Yes, it's possible; fort instance, using Intel's Active Management Technology...

A black MacBook monitor showing CSS code 1
CSS
5 Ways to Learn HTML and CSS With Real UI Challenges

Follow these strategies to unlock your web development skills with interactive learning, creative challenges, and practical experience.

woman fixing cables in a data centre feature 1
What Is Half-Duplex and Full-Duplex and How Does It Affect Your Router?

Wi-Fi and communication are shaped by duplexing. But what is duplexing, and how does it affect your communication?

A child using safe internet with his parent 1
An Introduction for Parents Talking to Children About Online Safety

How do you keep kids safe online? It's a tricky thing to master, so here's a guide to approaching cybersecurity with your youngsters.

A woman stands next to a server rack holding a laptop. 1
VB.NET SQL Examples for Querying Databases Efficiently

Discover how to issue the most common SQL commands using VB.NET.

hackers targetting a docker container 1
An In-Depth Introduction to DDOS Defense Strategy: How to Protect Against Botnet Attacks

When many machines target your site or servers, your systems can all come crashing down. You need a plan.

ubuntu-static-ip-settings 1
How to Configure Static IP Address on Ubuntu 22.04 LTS and 22.10

Switching from dynamic IP allocation to static IP addresses is easy on Ubuntu 22.04 "Jammy Jellyfish" and 22.10.

A router 1
What Is Port Scanning and How Does It Work?

Is it safe to leave your ports open?

hacking into bluetooth laptop smartphone coding 1
Is Mobile Hacking Still a Big Threat in 2023?

We all try to protect our laptops and PCs from hackers, but are our smartphones also at risk?

HTML codes with ARIA attributes 1
How to Use ARIA (Accessible Rich Internet Applications) in HTML and CSS

Small tweaks to your HTML can bring large benefits to your readers.

A chip keychain representing digital keys 1
Why Digital Car Keys Are Not Safe and Secure

Some car manufacturers allow you to unlock and start your vehicle using your phone, but is that safe? Can digital car keys be hacked?

Screen of a tool used for SIEM 1
What Is SIEM and How Can You Use It to Optimize Your Security?

Keeping track of security threats and flaws is difficult. That's why you need Security Information and Event Management.

An attacker trying to gain access to a computer system 1
A Beginner's Guide to Supervising Access to Computer Systems

Computer systems store a lot of important data, so how is such information actually kept secure? It ultimately comes down to who you give access to...

A hacker using artificial intelligence to crack passwords 1
Yes, AI Can Crack Your Password, but Can You Prevent It?

Artificial intelligence can be used to crack your passwords: here's how it works and how you can protect yourself from the AI threat.

Penetration tester analyzes a bug bounty system 1
Ethical Hacking: What Are the Stages of Penetration Testing?

How do cybercriminals hack into systems? How can you protect against them? Ethical hackers can show you via pentests.

1 2 3 4 5
Page 1 / 6