Read More

Smart Watches for Kids

This story began on May 4, 2022, with an email from a reader named Erman ATEŞ. In his email, Mr. Erman, a conscious and sensitive father, stated that smart kids’ watches are increasingly being preferred by many parents for valid reasons, but due to their lack of conformity to standards…
Read More
Read More

Run Mert Run

Starting in 2020, due to the increasing impact of the Covid-19 pandemic in our country, I began doing sports with my sports coach through WhatsApp instead of going to the gym. Over time, my coach directed me to purchase various sports equipment such as a pull-up bar, weight set, and…
Read More
Read More

Stolen Credit Card Hunt

As a cybersecurity researcher who uses social media very effectively, you know that I have turned messages I have received through social networks and emails into security research, and then into articles and presentations. In this story, which has the same starting point as others, you can see how I…
Read More
Read More

Instagram Scammers

Those of you who have read my previous blog posts titled “Sponsored Scamming” “LinkedIn Scammers” and “Who Viewed My Profile?” have learned that social media platforms are effectively used by scammers. However, what surprised me the most after writing these articles was that almost 2 years later, after almost 2…
Read More
Read More

You Can Run, But You Can’t Hide

In the past, there was a threat actor, when the barbers were fleas, and the horses were jesters. This threat actor had sent an email to top-level employees of the institutions he targeted, with an HTML file attached. When this HTML file was opened, and the link address (https://go0gle-drive[.]blogspot[.]com) followed,…
Read More
Read More

Combatting SIM Swapping

In today’s world, we use two-factor authentication for security when logging in to everything from our email accounts to our social media accounts, from our internet banking accounts to the accounts that hold the source code of software we develop. When we hear the term two-factor authentication, many of us…
Read More
Read More

Hooking on Android

Although our topic is the Android world, when it comes to hooking, I first think of the illegal electricity that is drawn by hooking onto energy transmission lines and into homes. In the Android world, we also use a similar method when we want to dynamically analyze or intervene in…
Read More
Read More

Cerberus Analysis

In February 2020, I received a SMS on my cell phone that made me quite suspicious. When I visited the https://ko[.]tc/hediyekazani web address mentioned in the message, I found that I was redirected to the http://www-bedavainternethediyeuygulama[.]com web address. A short time after receiving the SMS, when I visited the website…
Read More