{"id":3966,"date":"2021-09-07T12:10:41","date_gmt":"2021-09-07T09:10:41","guid":{"rendered":"https:\/\/www.hostixo.com\/blog\/?p=3966"},"modified":"2024-05-24T11:39:53","modified_gmt":"2024-05-24T08:39:53","slug":"bilisim-suclari-nelerdir","status":"publish","type":"post","link":"https:\/\/www.hostixo.com\/blog\/bilisim-suclari-nelerdir\/","title":{"rendered":"Bili\u015fim Su\u00e7lar\u0131 Nelerdir? Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7indekiler \u2714<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"\u0130\u00e7indekiler Tablosunu A\u00e7\/Kapat\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.hostixo.com\/blog\/bilisim-suclari-nelerdir\/#Bilisim_Suclari_Nelerdir_Yasanmis_Bilisim_Suclari_Ornekleri\" >Bili\u015fim Su\u00e7lar\u0131 Nelerdir? Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.hostixo.com\/blog\/bilisim-suclari-nelerdir\/#Bilisim_Suclarinin_Turleri_Nelerdir\" >Bili\u015fim Su\u00e7lar\u0131n\u0131n T\u00fcrleri Nelerdir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.hostixo.com\/blog\/bilisim-suclari-nelerdir\/#Yasanmis_Bilisim_Suclari_Ornekleri\" >Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.hostixo.com\/blog\/bilisim-suclari-nelerdir\/#Bilisim_Suclarina_Karsi_Kendinizi_Nasil_Korursunuz\" >Bili\u015fim Su\u00e7lar\u0131na Kar\u015f\u0131 Kendinizi Nas\u0131l Korursunuz?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1><span class=\"ez-toc-section\" id=\"Bilisim_Suclari_Nelerdir_Yasanmis_Bilisim_Suclari_Ornekleri\"><\/span>Bili\u015fim Su\u00e7lar\u0131 Nelerdir? Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><strong>Bili\u015fim su\u00e7lar\u0131<\/strong> terimi, finansal \u015fantaj, veri h\u0131rs\u0131zl\u0131\u011f\u0131, kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, casusluk ve daha fazlas\u0131 amac\u0131yla internette ger\u00e7ekle\u015ftirilen yasa d\u0131\u015f\u0131 faaliyetleri ifade eder. Bir bilgisayar\u0131, bilgisayar a\u011f\u0131n\u0131 veya a\u011f ba\u011flant\u0131l\u0131 bir ayg\u0131t\u0131 hedefleyen veya kullanan bir su\u00e7 faaliyeti olarak da tan\u0131mlanabilir. Siber su\u00e7lar\u0131n tamam\u0131 olmasa da \u00e7o\u011fu siber su\u00e7lular veya para kazanmak isteyen bilgisayar korsanlar\u0131 taraf\u0131ndan i\u015flenir.<\/p>\n<p>Baz\u0131 <strong>bili\u015fim su\u00e7lar\u0131<\/strong> organizasyoneldir, geli\u015fmi\u015f teknikler kullan\u0131r ve teknik a\u00e7\u0131dan olduk\u00e7a yeteneklidir. Nadiren siber su\u00e7lar, kar amac\u0131 g\u00fctmeyen nedenlerle bilgisayarlara zarar vermeyi ama\u00e7lar. Bunlar genellikle siyasi veya ki\u015fisel olabilir.<\/p>\n<p>Bu bilgiler \u0131\u015f\u0131\u011f\u0131nda ister arkada\u015flar\u0131n\u0131zla sohbet olsun isterseniz al\u0131\u015fveri\u015f gibi ticari i\u015flemler ger\u00e7ekle\u015ftirin veya sabit bir eylem ger\u00e7ekle\u015ftiriyor olun \u00e7evrimi\u00e7i faaliyetler hal su\u00e7lara kar\u015f\u0131 savunmas\u0131zd\u0131r. \u00c7evrimi\u00e7i olarak ger\u00e7ekle\u015ftirdi\u011finiz her olay ki\u015fisel g\u00fcvenli\u011fi, fiziksel su\u00e7lar kadar etkili bir \u015fekilde tehlikeye atabilir. Bunlardan nas\u0131l korunaca\u011f\u0131 her bir bireyin stat\u00fcs\u00fc fark etmeksizin bilmelidir. \u00c7e\u015fitli siber su\u00e7lar\u0131n ve bunlar\u0131n a\u00e7\u0131klamalar\u0131ndan bu t\u00fcr su\u00e7lar\u0131n bilgisayarlar\u0131n ve internetin halka a\u00e7\u0131lmas\u0131ndan \u00e7ok \u00f6nce var oldu\u011funu g\u00f6rebilirsiniz. Tek fark, su\u00e7lar\u0131 i\u015flemek i\u00e7in kullan\u0131lan ara\u00e7lard\u0131r.<\/p>\n<p><strong>Bili\u015fim su\u00e7lar\u0131<\/strong> \u00fc\u00e7 genel kategoriye ayr\u0131l\u0131r:<\/p>\n<p><strong>Bilgisayar cihaz\u0131n\u0131n hedef oldu\u011fu<\/strong> su\u00e7lar &#8211; \u00f6rne\u011fin, a\u011f eri\u015fimine m\u00fcdahale etmek;<\/p>\n<p>Bilgisayar\u0131n bir silah olarak kullan\u0131ld\u0131\u011f\u0131 <strong>bili\u015fim su\u00e7lar\u0131<\/strong> &#8211; \u00f6rne\u011fin, bir hizmet reddi (DoS) sald\u0131r\u0131s\u0131 ba\u015flatmak.<\/p>\n<p><strong>Bilgisayar\u0131n bir su\u00e7a arac\u0131 olarak kullan\u0131ld\u0131\u011f\u0131 su\u00e7lar<\/strong> \u2013 \u00f6rne\u011fin, yasad\u0131\u015f\u0131 olarak elde edilen verileri depolamak i\u00e7in bir bilgisayar kullanmak.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Bilisim_Suclarinin_Turleri_Nelerdir\"><\/span><strong><br \/>\n<\/strong>Bili\u015fim Su\u00e7lar\u0131n\u0131n T\u00fcrleri Nelerdir?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-9114 size-full lazyload\" data-src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/bilisim-suclari.jpg\" alt=\"bili\u015fim su\u00e7lar\u0131\" width=\"1200\" height=\"1200\" title=\"\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1200px; --smush-placeholder-aspect-ratio: 1200\/1200;\"><noscript><img decoding=\"async\" class=\"alignnone wp-image-9114 size-full\" src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/bilisim-suclari.jpg\" alt=\"bili\u015fim su\u00e7lar\u0131\" width=\"1200\" height=\"1200\" title=\"\"><\/noscript><\/p>\n<p>Yukar\u0131da bahsedilen kategoriler alt\u0131nda i\u015flenen <strong>bili\u015fim su\u00e7lar\u0131n t\u00fcr\u00fcne<\/strong> vermek gerekirse:<\/p>\n<p><strong>Tehdit Yoluyla Sald\u0131r\u0131<\/strong>: Bir ki\u015fiyi, e-posta, video veya telefon gibi bir bilgisayar a\u011f\u0131n\u0131n kullan\u0131m\u0131 yoluyla (\u00f6rne\u011fin \u00e7al\u0131\u015fanlar veya topluluklar gibi) g\u00fcvenli\u011finden sorumlu olduklar\u0131 ki\u015filerin veya ailelerinin veya ki\u015filerin hayatlar\u0131ndan endi\u015fe duyarak tehdit etmek.<\/p>\n<p><strong>\u00c7ocuk pornosu:<\/strong> Re\u015fit olmayan \u00e7ocuklar\u0131 cinsel olarak s\u00f6m\u00fcren materyaller olu\u015fturmak, da\u011f\u0131tmak veya bunlara eri\u015fmek i\u00e7in bilgisayar a\u011flar\u0131n\u0131n kullan\u0131lmas\u0131.<\/p>\n<p><strong>Siber ka\u00e7ak\u00e7\u0131l\u0131k:<\/strong> \u2013 baz\u0131 yerlerde yasaklanan yasa d\u0131\u015f\u0131 \u00f6\u011felerin internet \u00fczerinden (\u015fifreleme teknolojisi gibi) aktar\u0131lmas\u0131.<\/p>\n<p><strong>\u0130nternet \u00fczerinden fuhu\u015f reklam\u0131 yapmak veya te\u015fvik etmek<\/strong>: \u0130nternet \u00fczerinden fuhu\u015fa eri\u015fmek yasalara ayk\u0131r\u0131d\u0131r, \u00e7\u00fcnk\u00fc internete eri\u015fim s\u00fcreci bazen ulusal s\u0131n\u0131rlar\u0131 a\u015fmaktad\u0131r.<\/p>\n<p><strong>Siber aklama<\/strong>: Kayna\u011f\u0131n\u0131 ve muhtemelen hedefini gizlemek amac\u0131yla yasa d\u0131\u015f\u0131 olarak elde edilen paralar\u0131n elektronik transferidir.<\/p>\n<p><strong>Siber h\u0131rs\u0131zl\u0131k<\/strong>: Bu <strong>bili\u015fim su\u00e7u<\/strong> t\u00fcr\u00fc \u015funlarla ilgili faaliyetleri i\u00e7erir: K\u0131rma, izinsiz giri\u015f, DNS \u00f6nbelle\u011fi zehirlenmesi, zimmete para ge\u00e7irme ve yasad\u0131\u015f\u0131 tahsis, casusluk, kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, doland\u0131r\u0131c\u0131l\u0131k, k\u00f6t\u00fc niyetli bilgisayar korsanl\u0131\u011f\u0131, intihal ve korsanl\u0131k.<\/p>\n<p><strong>Siber takip<\/strong>: e-posta, telefonlar, metin mesajlar\u0131, web kameralar\u0131, web <a href=\"https:\/\/www.hostixo.com\/hosting\/hazir-site\/\" data-internallinksmanager029f6b8e52c=\"11\" title=\"haz\u0131r site\">site<\/a>leri veya videolar gibi bilgisayar teknolojisinin kullan\u0131m\u0131 yoluyla korku yaratan a\u00e7\u0131k veya z\u0131mni fiziksel tehditler.<\/p>\n<p><strong>Siber ter\u00f6rizm:<\/strong> Bilgisayar teknolojisinin kullan\u0131m\u0131 veya yard\u0131m\u0131yla sivillere kar\u015f\u0131 i\u015flenen, \u00f6nceden tasarlanm\u0131\u015f, genellikle siyasi g\u00fcd\u00fcml\u00fc \u015fiddet.<\/p>\n<p><strong>\u00c7evrimi\u00e7i kumar oynatma<\/strong>: \u0130nternet \u00fczerinden yasal olmayan \u015fekilde kumar oynamak, yasalar\u0131n\u0131n ihlaline girer. \u00c7\u00fcnk\u00fc kumar hizmeti sa\u011flay\u0131c\u0131lar\u0131, yasa d\u0131\u015f\u0131 olan kredi kartlar\u0131, banka kartlar\u0131 ve elektronik fon transferleri yoluyla kumar oynamak i\u00e7in elektronik \u00f6deme talep etmektedir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Yasanmis_Bilisim_Suclari_Ornekleri\"><\/span>Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-3970 lazyload\" data-src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/hacker-4703108_1920.jpg\" alt=\"\" width=\"1920\" height=\"1280\" title=\"\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1920px; --smush-placeholder-aspect-ratio: 1920\/1280;\"><noscript><img decoding=\"async\" class=\"alignnone size-full wp-image-3970\" src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/hacker-4703108_1920.jpg\" alt=\"\" width=\"1920\" height=\"1280\" title=\"\"><\/noscript><\/p>\n<p>Farkl\u0131 kategoriler alt\u0131nda ve farkl\u0131 t\u00fcrlerde akla hayale gelmeyecek \u015fekilde bili\u015fim su\u00e7lar\u0131 i\u015flenir. <strong>Bili\u015fim su\u00e7lar\u0131na \u00f6rnekler<\/strong> vermek i\u00e7in baz\u0131 ya\u015fanm\u0131\u015f olaylar\u0131 anlataca\u011f\u0131z. Genel kategoride i\u015flenmi\u015f ve <strong>ya\u015fanm\u0131\u015f siber su\u00e7 olaylar\u0131<\/strong> \u015fu \u015fekildedir.<\/p>\n<h3>Mafiaboy<\/h3>\n<p>&#8216;Mafiaboy&#8217; ya da ger\u00e7ek ad\u0131yla Michael Calce, yak\u0131n zamanda finansal olarak en \u00e7ok zarar veren bilgisayar korsanlar\u0131ndan biridir. Toplam zarar, , bir noktada 1,2 Milyar USD olarak rapor edildi. Mafiaboy\u2019un, 2000 y\u0131l\u0131nda Dell, Yahoo, Amazon ve eBay gibi devlere y\u00f6nelik korsan sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirdi\u011fi biliniyor.<\/p>\n<h3>Epsilon Olay\u0131<\/h3>\n<p>The Epsilon olay\u0131 <strong>en b\u00fcy\u00fck bili\u015fim su\u00e7lar\u0131<\/strong> alt\u0131nda \u201cy\u00fczy\u0131l\u0131n hack\u2019i\u201d olarak bilinir. Ve bu \u00fcnvan\u0131 almas\u0131n\u0131n alt\u0131nda ayr\u0131nt\u0131lardaki nedeni yat\u0131yor. Epsilon, tek amac\u0131 pazarlama e-postalar\u0131 sa\u011flamak olan bir \u015firket olarak faaliyetleri devam ettirir; bu da b\u00fcy\u00fck bir e-posta veri taban\u0131na sahip oldu\u011fu anlam\u0131na gelir. Epsilon&#8217;un y\u0131lda 40 milyardan fazla pazarlama e-postas\u0131ndan sorumlu oldu\u011fu da istatistik kurumlar\u0131nca bildiriliyordu. Epsilon&#8217;un, Citibank ve U.S Bank gibi b\u00fcy\u00fck kurulu\u015flar\u0131 i\u00e7eren yakla\u015f\u0131k 2200 m\u00fc\u015fterisi var.<\/p>\n<p>Epsilon arac\u0131l\u0131\u011f\u0131yla e-posta veri tabanlar\u0131n\u0131n g\u00fcvenli\u011fi ihlal edilen \u015firketlerin uzun listesi, geleneksel kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n daha hedefli bir versiyonu olan <strong>hedef odakl\u0131 kimlik av\u0131<\/strong> sald\u0131r\u0131lar\u0131n\u0131n ger\u00e7ekle\u015fme olas\u0131l\u0131\u011f\u0131n\u0131 net bir \u015fekilde art\u0131rd\u0131. Epsilon ihlalinin ger\u00e7ekte ne kadar hasara yol a\u00e7t\u0131\u011f\u0131n\u0131 tam olarak tahmin etmek zor olsa da. 4 milyar dolar gibi y\u00fcksek rakamlardan bahsediliyor. Her iki durumda da Epsilon olay\u0131, siber su\u00e7 tarihindeki en b\u00fcy\u00fck olaylardan biriydi.<\/p>\n<h3>Sven Jaschan<\/h3>\n<p>Tarihteki en b\u00fcy\u00fck ve en k\u00f6t\u00fc <strong>siber su\u00e7<\/strong> Sven Jaschan taraf\u0131ndan i\u015flendi. 2004 y\u0131l\u0131nda 18. do\u011fum g\u00fcn\u00fc m\u00fcnasebetiyle bir vir\u00fcs sald\u0131. Bu, t\u00fcm d\u00fcnyada yank\u0131 uyand\u0131ran \u00e7ok tehlikeli bir vir\u00fcs t\u00fcr\u00fcyd\u00fc. Tahmini hasar yakla\u015f\u0131k 500 milyon dolard\u0131r. Uzmanlar, Delta Air Lines&#8217;\u0131n bilgisayar sistemini devre d\u0131\u015f\u0131 b\u0131rakt\u0131\u011f\u0131 i\u00e7in daha fazla olabilece\u011fini de dile getiriyordu. Su\u00e7lar\u0131ndan dolay\u0131 Microsoft, ba\u015f\u0131na 250.000 dolar \u00f6d\u00fcl koydu. Daha sonra \u00fc\u00e7 ayl\u0131k bir insan av\u0131 operasyonundan sonra yakaland\u0131.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Bilisim_Suclarina_Karsi_Kendinizi_Nasil_Korursunuz\"><\/span>Bili\u015fim Su\u00e7lar\u0131na Kar\u015f\u0131 Kendinizi Nas\u0131l Korursunuz?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-3971 lazyload\" data-src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/hacking-2964100_1920.jpg\" alt=\"\" width=\"1920\" height=\"1280\" title=\"\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1920px; --smush-placeholder-aspect-ratio: 1920\/1280;\"><noscript><img decoding=\"async\" class=\"alignnone size-full wp-image-3971\" src=\"https:\/\/www.hostixo.com\/blog\/wp-content\/uploads\/2021\/09\/hacking-2964100_1920.jpg\" alt=\"\" width=\"1920\" height=\"1280\" title=\"\"><\/noscript><\/p>\n<p>Siber su\u00e7lar\u0131n g\u00fcn\u00fcm\u00fczde daha \u00f6nemli bir tehdit oldu\u011funa dair hi\u00e7 kimsenin \u015f\u00fcphesi yok. \u00c7o\u011fu <strong>bili\u015fim su\u00e7u<\/strong>, her y\u0131l geli\u015fmeye devam ediyor. Bu nedenle bili\u015fim su\u00e7lar\u0131na kar\u015f\u0131 kendinizi nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 \u00f6\u011frenmeniz gerekir.<\/p>\n<h3>Anti spyware yaz\u0131l\u0131mlar\u0131 kullanmak<\/h3>\n<p>Anti spyware yaz\u0131l\u0131mlar\u0131 kullanmak, \u00e7evrimi\u00e7i oldu\u011funuzda finansal ve \u00f6zel bilgilerinizi koruman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<h3>G\u00fc\u00e7l\u00fc \u015fifreler olu\u015fturun<\/h3>\n<p>\u015eifrelerinizi farkl\u0131 web sitelerine girmeyin. Aksi takdirde, \u015fifrenizi d\u00fczenli olarak de\u011fi\u015ftirmeniz gerekir. Bu \u015fekilde i\u015fleri daha karma\u015f\u0131k hale getirebilirsiniz. Ayr\u0131ca say\u0131, harf ve sembolleri birlikte kullanmak g\u00fcvenlik seviyesini art\u0131r\u0131r.<\/p>\n<h3>G\u00fcvenli\u011fi art\u0131r\u0131lm\u0131\u015f i\u015f ve ev a\u011flar\u0131 kullan\u0131n<\/h3>\n<p>Sanal \u00f6zel a\u011f i\u00e7in g\u00fc\u00e7l\u00fc bir \u015fifreleme parolas\u0131 belirlemek iyi bir fikirdir. Bir VPN kullanmak her zaman avantajd\u0131r. Bunun nedeni, <a href=\"https:\/\/www.hostixo.com\/blog\/baglantiniz-gizli-degil-hatasinin-cozumu\/\">VPN<\/a> online aktivitelerinizi ba\u015fkas\u0131n\u0131n izlemesini zorla\u015ft\u0131r\u0131r.<\/p>\n<h3>Pop-up ve \u015f\u00fcpheli e-posta eklerinden uzak durun<\/h3>\n<p>Sahte e-postalar ve k\u0131sa mesajlar yaln\u0131zca yayg\u0131n olmakla kalm\u0131yor, giderek daha inand\u0131r\u0131c\u0131 hale geliyor. Bir e-posta veya a\u00e7\u0131l\u0131r pencere sizden kullan\u0131c\u0131 ad\u0131n\u0131z\u0131 veya \u015fifrenizi girmenizi isterse, yapmay\u0131n. Bunun yerine, taray\u0131c\u0131n\u0131z\u0131 a\u00e7\u0131n ve do\u011frudan siteye gidin. H\u00e2l\u00e2 ikna olmad\u0131ysan\u0131z, sizinle ileti\u015fim kurdu\u011funu iddia eden \u015firket veya kurulu\u015fla ileti\u015fime ge\u00e7in. Ger\u00e7ek \u015firketler sizden asla e-posta yoluyla giri\u015f bilgilerinizi istemezler.<\/p>\n<p><strong>Alabilece\u011finiz di\u011fer \u00f6nlemler:<\/strong><\/p>\n<ul>\n<li>Verilerinizi d\u00fczenli olarak yedeklemek.<\/li>\n<li>G\u00fcvenilir web siteleri ile i\u015flerinizi bitirmek.<\/li>\n<li>Kulland\u0131\u011f\u0131n\u0131z yaz\u0131l\u0131mlar\u0131 g\u00fcncel tutmak.<\/li>\n<li>Sosyal medya ayarlar\u0131n\u0131z\u0131n g\u00fcvenlik ile ilgili b\u00f6l\u00fcm\u00fcn\u00fc y\u00f6netin.<\/li>\n<\/ul>\n<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\/\", \n  \"@type\": \"Product\", \n  \"name\": \"Hostixo Blog\",\n  \"image\": \"https:\/\/www.hostixo.com\/blog\/\",\n  \"description\": \"Hostixo Blog\",\n  \"brand\": \"HostixoBlog1\",\n  \"sku\": \"HostixoBlog1\",\n  \"gtin8\": \"HostixoBlog1\",\n  \"gtin13\": \"HostixoBlog1\",\n  \"gtin14\": \"HostixoBlog1\",\n  \"mpn\": \"HostixoBlog1\",\n  \"offers\": {\n    \"@type\": \"Offer\",\n    \"url\": \"https:\/\/www.hostixo.com\/blog\/\",\n    \"priceCurrency\": \"TRY\",\n    \"price\": \"0.99\",\n    \"priceValidUntil\": \"2020-06-09\",\n    \"availability\": \"https:\/\/schema.org\/InStock\",\n    \"itemCondition\": \"https:\/\/schema.org\/NewCondition\"\n  },\n  \"aggregateRating\": {\n    \"@type\": \"AggregateRating\",\n   \"ratingValue\": \"5\",\n    \"bestRating\": \"5\",\n    \"worstRating\": \"4\",\n    \"ratingCount\": \"1456\",\n    \"reviewCount\": \"1446\"\n  },\n  \"review\": {\n    \"@type\": \"Review\",\n    \"name\": \"HostixoBlog1\",\n    \"reviewBody\": \"Hostixo Blog\",\n    \"reviewRating\": {\n      \"@type\": \"Rating\",\n   \"ratingValue\": \"5\",\n      \"bestRating\": \"5\",\n      \"worstRating\": \"4\"\n    },\n    \"datePublished\": \"2020-06-09\",\n    \"author\": {\"@type\": \"Person\", \"name\": \"Hostixo\"},\n    \"publisher\": {\"@type\": \"Organization\", \"name\": \"HostixoBlog1\"}\n  }\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bili\u015fim Su\u00e7lar\u0131 Nelerdir? Ya\u015fanm\u0131\u015f Bili\u015fim Su\u00e7lar\u0131 \u00d6rnekleri Bili\u015fim su\u00e7lar\u0131 terimi, finansal \u015fantaj, veri h\u0131rs\u0131zl\u0131\u011f\u0131, kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, casusluk ve daha fazlas\u0131 amac\u0131yla internette ger\u00e7ekle\u015ftirilen yasa d\u0131\u015f\u0131 faaliyetleri ifade eder. Bir bilgisayar\u0131, bilgisayar a\u011f\u0131n\u0131 veya a\u011f ba\u011flant\u0131l\u0131 bir ayg\u0131t\u0131 hedefleyen veya kullanan bir su\u00e7 faaliyeti olarak da tan\u0131mlanabilir. Siber su\u00e7lar\u0131n tamam\u0131 olmasa da \u00e7o\u011fu siber su\u00e7lular veya &hellip;<\/p>\n","protected":false},"author":1,"featured_media":3968,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-genel"],"_links":{"self":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts\/3966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/comments?post=3966"}],"version-history":[{"count":2,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts\/3966\/revisions"}],"predecessor-version":[{"id":9115,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/posts\/3966\/revisions\/9115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/media\/3968"}],"wp:attachment":[{"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/media?parent=3966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/categories?post=3966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostixo.com\/blog\/wp-json\/wp\/v2\/tags?post=3966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}