Read More 6 minute read CYBERSECURITY ENGLISH Closer Than CloseByMert SARICA2 October 2017 In both the pre-digital age and the digital age, when you examine the lives of bank robbers who… Read More 0 0 0 0 0
Read More 3 minute read CYBERSECURITY ENGLISH Threat Hunting with YaraByMert SARICA1 September 2017 Throughout the world, the trend of encrypting data on end-user systems with malicious software (such as Cryptolocker) and… Read More 0 0 0 0 0
Read More 4 minute read CYBERSECURITY ENGLISH Threat HuntingByMert SARICA1 August 2017 Sometimes, after writing a blog post about a malware, I find myself asking, “How would I detect this… Read More 0 0 0 0 0
Read More 6 minute read CYBERSECURITY ENGLISH Hacker Hunt with a Deception SystemByMert SARICA3 July 2017 I have been hearing this question more and more frequently from many people around me, both those I… Read More 0 0 0 0 0
Read More 4 minute read CYBERSECURITY ENGLISH The APT AttemptByMert SARICA3 April 2017 With each passing year, serious cyber security breaches are being experienced and institutions that learn from others’ experiences… Read More 0 0 0 0 0
Read More 3 minute read CYBERSECURITY ENGLISH It’s a Bird… It’s a Plane… It’s Drone!ByMert SARICA1 September 2016 Unmanned Aerial Vehicles (UAVs), commonly known as drones, which can be easily purchased online with just a click… Read More 0 0 0 0 0
Read More 3 minute read CYBERSECURITY ENGLISH Java DecompilersByMert SARICA1 March 2016 I agree that working at byte code level is sometimes a bit challenging. If the mission is analyzing… Read More 0 0 0 0 0
Read More 6 minute read CYBERSECURITY ENGLISH RF World and SecurityByMert SARICA1 February 2016 Since I was a child, remote-controlled garage doors have always caught my attention. As I grew older and… Read More 0 0 0 0 0
Read More 3 minute read CYBERSECURITY ENGLISH Microsoft Office Macro AnalysisByMert SARICA1 December 2015 Some of you, who are the same age as me or older might remember the Melissa malware that… Read More 0 0 0 0 0