{"id":88,"date":"2022-01-31T08:26:56","date_gmt":"2022-01-31T05:26:56","guid":{"rendered":"https:\/\/efekanrasit.com\/?p=88"},"modified":"2022-10-26T09:15:11","modified_gmt":"2022-10-26T09:15:11","slug":"phishing-oltalama-saldirisi-nedir","status":"publish","type":"post","link":"https:\/\/kayizer.com\/blog\/phishing-oltalama-saldirisi-nedir\/","title":{"rendered":"Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nedir?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"phishing-saldirisi-nedir\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>Phishing Sald\u0131r\u0131s\u0131 Nedir?<\/strong><\/mark><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nedir?, ger\u00e7ek web sitesi veya e-posta gibi g\u00f6r\u00fcnerek oturum a\u00e7ma kimlik bilgileri, kredi kart\u0131 numaralar\u0131, banka hesap numaralar\u0131 veya di\u011fer finansal bilgiler gibi hassas bilgileri ele ge\u00e7irmeye \u00e7al\u0131\u015fan bir\u00a0<strong>siber sald\u0131r\u0131d\u0131r<\/strong>. T.C. kimlik numaras\u0131 , telefon numaralar\u0131 ve sosyal medya hesap bilgileri de\u00a0kimlik h\u0131rs\u0131zl\u0131\u011f\u0131\u00a0yapan siber su\u00e7lular i\u00e7in ortak hedeflerdir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing sald\u0131r\u0131s\u0131,&nbsp;<strong>sosyal m\u00fchendislik<\/strong>le birlikte aciliyet duygusu olu\u015fturarak kurbanlar\u0131 kand\u0131r\u0131r. Kurban bir oltalama e-postas\u0131 veya metin mesaj\u0131n\u0131 a\u00e7\u0131p k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131ya t\u0131klad\u0131\u011f\u0131nda, ger\u00e7ek siteyle e\u015fle\u015fen sahte bir&nbsp;<strong>web<\/strong>&nbsp;sitesine y\u00f6nlendirilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Yayg\u0131n olarak kullan\u0131lan&nbsp;phishing&nbsp;sald\u0131r\u0131lar\u0131nda siber su\u00e7lular finansal kurumlar\u0131n\u0131, i\u015f arkada\u015flar\u0131ndan gelen e-postalar\u0131, devlet kurumlar\u0131n\u0131, sosyal medya sitelerini ve \u00e7evrimi\u00e7i \u00f6deme i\u015flemcilerini klonlayarak ger\u00e7ekle\u015ftirirler.<\/p>\n\n\n\n<p class=\"has-medium-font-size wp-block-paragraph\"><strong><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-green-cyan-color\">Phishing sald\u0131r\u0131lar\u0131n\u0131n ortak belirtileri \u015funlard\u0131r;<\/mark><\/strong><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Alt alan adlar\u0131n\u0131n, yanl\u0131\u015f yaz\u0131lm\u0131\u015f<strong>\u00a0URL<\/strong>\u2018lerin veya di\u011fer \u015f\u00fcpheli URL\u2019lerin kullan\u0131m\u0131<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Tehdit akt\u00f6r\u00fc kurumsal bir e-posta yerine Gmail vb. bir \u00fccretsiz eposta sa\u011flay\u0131c\u0131s\u0131n\u0131 kullan\u0131yor ve eposta i\u00e7eri\u011findeki alan ad\u0131, linkin verildi\u011fi sahte alan ad\u0131yla do\u011frudan e\u015fle\u015fmiyor.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Mesaj, korku veya aciliyet duygusu uyand\u0131rmak i\u00e7in tasarlanm\u0131\u015ft\u0131r.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Mesaj, banka oturum a\u00e7ma bilgileriniz veya sosyal medya parolan\u0131z gibi ki\u015fisel bilgileri do\u011frulama iste\u011fini i\u00e7erir.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> E-posta, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m veya\u00a0<strong>fidye yaz\u0131l\u0131m\u0131<\/strong>\u00a0olabilecek beklenmeyen veya ola\u011fand\u0131\u015f\u0131 bir ek i\u00e7eriyor.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> G\u00f6nderenin ad\u0131n\u0131 biliyorsunuz ama normalde onlarla ileti\u015fim kurmuyorsunuz, \u00f6zellikle de e-postan\u0131n i\u015f sorumluluklar\u0131n\u0131zla ilgisi yoksa<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> \u0130letilen mesaj hi\u00e7 girmedi\u011finiz bir yar\u0131\u015fmay\u0131 kazanm\u0131\u015fs\u0131n\u0131z gibi ger\u00e7ek olmayacak kadar kula\u011fa ho\u015f geliyor.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">Phishing sald\u0131r\u0131lar\u0131yla nelerin \u00e7al\u0131nmas\u0131 ama\u00e7lan\u0131yor ?<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Phishing y\u00f6ntemi kullanarak bilgisayar kullan\u0131c\u0131lar\u0131n\u0131 kand\u0131ran sald\u0131rganlar genellikle a\u015fa\u011f\u0131daki bilgilere eri\u015fmeyi hedeflemektedirler.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Kullan\u0131c\u0131 hesap numaralar\u0131 \u00a0<\/li><li>Kredi kart\u0131 numaralar\u0131<\/li><li>Kullan\u0131c\u0131 \u015fifreleri ve parolalar\u0131<\/li><li>\u0130nternet bankac\u0131l\u0131\u011f\u0131nda kullan\u0131lan kullan\u0131c\u0131 kodu ve \u015fifreleri vb.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"font-size:25px\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><strong>Son D\u00f6nemde Ya\u015fanan Baz\u0131 Phishing Sald\u0131r\u0131lar\u0131<\/strong><\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-light-green-cyan-color\">Hackerlar, Sony \u015eirket Verilerini Ele ge\u00e7irmek \u0130\u00e7in Phishing Sald\u0131r\u0131s\u0131 Ger\u00e7ekle\u015ftirdi.<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Sony<\/strong>&nbsp;\u00e7al\u0131\u015fanlar\u0131na g\u00f6nderilen bir dizi hedef odakl\u0131&nbsp;<strong>phishing<\/strong>&nbsp;epostas\u0131 (spear phishing) ile Sony\u2019de b\u00fcy\u00fck bir g\u00fcvenlik ihlali olu\u015ftu. Tehdit akt\u00f6rleri, LinkedIn\u2019de Sony\u2019de \u00e7al\u0131\u015fan personelin adlar\u0131n\u0131 ile unvanlar\u0131n\u0131 ara\u015ft\u0131rarak tespit ettikleri \u00e7al\u0131\u015fanlara kendilerini \u015firket \u00e7al\u0131\u015fan\u0131 gibi g\u00f6sterip k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7eren epostalar g\u00f6nderdi. Sonu\u00e7ta, mali kay\u0131tlar, m\u00fc\u015fteri verileri vb. kay\u0131tlar\u0131 i\u00e7eren 100 terabayttan fazla veri ele ge\u00e7irildi. Bu&nbsp;<strong>phishing<\/strong>&nbsp;sald\u0131r\u0131s\u0131 Sony\u2019ye 100 milyon dolardan fazla mali zarara neden oldu.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u015eubat 2016\u2019da Kaspersky Lab, Symantec, AlienVault, Invincea, Trend Micro, Carbon Black, PunchCyber, RiskIQ, ThreatConnect ve Volexity ile ortakla\u015fa Novetta firmas\u0131 koordinasyonunda haz\u0131rlanan ve yay\u0131nlanan raporda, sald\u0131r\u0131n\u0131n Sony\u2019den ayr\u0131lm\u0131\u015f personel veya bir&nbsp;<strong>hacktvist<\/strong>&nbsp;taraf\u0131ndan yap\u0131lm\u0131\u015f olamayaca\u011f\u0131 bildirildi. Ayr\u0131ca,&nbsp;<strong>malware<\/strong>&nbsp;analizi, kod yap\u0131lar\u0131,&nbsp;<strong>TTP<\/strong>\u2019ler vb. hususlar (askeri casusluk kampanyas\u0131na da kat\u0131lm\u0131\u015f olmas\u0131) incelendi\u011finde hangi grup oldu\u011fu tam bilinemese de devlet destekli bir grup taraf\u0131ndan yap\u0131ld\u0131\u011f\u0131 de\u011ferlendirilmi\u015ftir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-light-green-cyan-color\">\u00dccretsiz iPhone 12? Bu Sahte \u2018Apple Chatbot\u2019 Davetine Dikkat Edin<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">D\u00fcnyan\u0131n en b\u00fcy\u00fck ak\u0131ll\u0131 telefon \u015firketlerinden biri olan Apple bir smishing kampanyas\u0131n\u0131n hedefi oldu\u011fu bildirildi. Sahte bir Apple chat box mesaj\u0131 ile, kullan\u0131c\u0131lara Apple\u2019\u0131n yeni iPhone 12 i\u00e7in 2020 test program\u0131n\u0131n bir par\u00e7as\u0131 olma \u015fans\u0131na sahip olduklar\u0131n\u0131 bildirildi. Al\u0131c\u0131lardan bir teslimat \u00fccreti \u00f6demeleri istendi. K\u00f6t\u00fc ama\u00e7l\u0131 bir web sitesine y\u00f6nlendiren tehdit akt\u00f6rleri, kurbanlar\u0131n \u00f6deme kart\u0131 kimlik bilgilerini ele ge\u00e7irdi.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.bgasecurity.com\/wp-content\/uploads\/2021\/12\/Picture2.png\" alt=\"\" class=\"wp-image-13411\"\/><\/figure>\n<\/div>\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-light-green-cyan-color\">E-Posta ile Phishing<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">E-posta y\u00f6ntemini kullanan doland\u0131r\u0131c\u0131lar burada da kullan\u0131c\u0131lar\u0131 farkl\u0131 \u015fekillerde aldatma yoluna giderler.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>a)<\/strong>&nbsp;E-postan\u0131za devaml\u0131 temas halinde oldu\u011funuz kurulu\u015flardan g\u00f6nderiliyormu\u015f izlenimi verilen sahte bir e-posta g\u00f6nderiliyor. Bu e-postalarda kullan\u0131c\u0131ya kurumun web sitesine gitmesinin gerekti\u011fi, \u015fifresinin s\u00fcresinin doldu\u011fu s\u00f6ylenir ve altta o sayfaya y\u00f6nlendirilece\u011fi bir link (ba\u011flant\u0131) verilir. Doland\u0131r\u0131c\u0131 daha \u00f6nceden haz\u0131rlad\u0131\u011f\u0131 ve kurulu\u015fun sitesinin ayn\u0131s\u0131 veya benzeri olan bu siteye kullan\u0131c\u0131y\u0131 getirdikten sonra, ondan \u015fifreyi girmesini ister. Doland\u0131r\u0131c\u0131 bu \u015fifreyi kullanarak internet arac\u0131l\u0131\u011f\u0131 ile para transferi, e-ticaret, sizin ad\u0131n\u0131za ba\u011f\u0131\u015f toplama, reklam g\u00f6nderme, \u00e7ok say\u0131da spam mesaj g\u00f6nderme vb. i\u015fler yapabilir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>b)<\/strong>&nbsp;Baz\u0131 e-postalarda ise; bir yar\u0131\u015fma d\u00fczenlendi\u011fi ve bu yar\u0131\u015fmaya kat\u0131lmas\u0131 teklif edilen kullan\u0131c\u0131lara \u00f6d\u00fcl olarak bir \u00fcr\u00fcn kazand\u0131klar\u0131 ancak gerekli ki\u015fisel bilgileri vermeleri gerekti\u011fi s\u00f6ylenir. Bu gibi durumlarda bilgilerini veren kullan\u0131c\u0131n\u0131n t\u00fcm bilgileri doland\u0131r\u0131c\u0131n\u0131n eline ge\u00e7er.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>c)<\/strong>&nbsp;Bir ba\u015fka kullan\u0131lan teknikte ise; gelen e-postada m\u00fc\u015fteriye ki\u015fisel bilgilerini g\u00fcncellemesi gerekti\u011fi, t\u00fcm bilgileri tekrar girmesi bunun kendileri a\u00e7\u0131s\u0131ndan daha iyi hizmet verebilmeleri i\u00e7in gerekli oldu\u011fu s\u00f6ylenir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>d)<\/strong>&nbsp;Bir ba\u015fka teknikte ise; gelen e-postada kullan\u0131c\u0131n\u0131n e-posta kotas\u0131n\u0131n doldu\u011fu, e\u011fer bilgilerini g\u00fcncellemezse hesab\u0131n\u0131n kapat\u0131laca\u011f\u0131 s\u00f6ylenir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>e)\u00a0<\/strong>Son zamanlarda baz\u0131 bankalar\u0131n ba\u015flatm\u0131\u015f olduklar\u0131 ve cep telefonlar\u0131 ile para transferine imk\u00e2n veren sistem kullan\u0131larak banka m\u00fc\u015fterilerine sanki kendi hesaplar\u0131na para g\u00f6nderilmi\u015f veya al\u0131nm\u0131\u015f gibi g\u00f6sterilip sahte banka sitesi linki (ba\u011flant\u0131 yolu) verilerek bu paran\u0131n tahsil edilebilmesi i\u00e7in bilgi g\u00fcncelle\u015ftirmesi istendi\u011fi bilinmektedir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-light-green-cyan-color\">E-posta hesab\u0131m\u0131n \u015fifresi ele ge\u00e7irildi\u011finde ne olur?<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>G\u00f6nderilecek mesaj\u0131n g\u00f6r\u00fcnen ismi, sizin isminiz yerine genellikle ba\u015fka bir isimle de\u011fi\u015ftirilir.<\/li><li>Mesaj\u0131n sonuna eklenecek olan imza metni de\u011fi\u015ftirilir.<\/li><li>Hesab\u0131n\u0131zda bulunan veya size sonradan gelecek olan mesajlar sald\u0131rgana y\u00f6nlendirilir ve sizdeki kopyas\u0131 silinir.<\/li><li>Hesab\u0131n\u0131zdaki mesajlar\u0131n t\u00fcm\u00fc silinebilir.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"font-size:25px\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">Phishing Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenebilir?<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Phishing<\/strong>&nbsp;sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemenin en \u00f6nemli yollar\u0131ndan birisi fark\u0131ndal\u0131k e\u011fitimleri ile&nbsp;<strong>phishing sald\u0131r\u0131lar\u0131<\/strong>&nbsp;konusunda personelin bilin\u00e7lendirilmesidir. Lehigh University, personelinizi e\u011fitmek i\u00e7in kullanabilece\u011finiz son zamanlardaki phishing \u00f6rneklerinden olu\u015fan \u00f6nemli bir kayna\u011fa sahiptir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> \u015e\u00fcpheli g\u00f6r\u00fcnen ekleri a\u00e7may\u0131n: Bu madde sadece tan\u0131mad\u0131\u011f\u0131n\u0131z ki\u015filer taraf\u0131ndan g\u00f6nderilen mesajlar i\u00e7in ge\u00e7erli de\u011fildir. Ayn\u0131 zamanda tan\u0131d\u0131klar\u0131n\u0131z oldu\u011funa inand\u0131\u011f\u0131n\u0131z g\u00f6ndericiler i\u00e7in de ge\u00e7erlidir. Oltalama kaynakl\u0131 olarak ba\u015flayan fidye yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131n\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu y\u00f6netici seviyesindeki \u00e7al\u0131\u015fanlar\u0131n kimlik bilgilerinin ele ge\u00e7irilmesi sonucunda olu\u015fmaktad\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Ki\u015fisel bilgileri vermekten ka\u00e7\u0131n\u0131n: Sald\u0131rganlar\u0131n sald\u0131r\u0131ya haz\u0131rlanma s\u00fcrecinde bir phishing epostas\u0131 g\u00f6ndermeyi hedefleyebilirler ve bilgilerinizi bir yerden almalar\u0131 gerekir. \u00d6nemli bilgiler i\u00e7in sosyal medya g\u00f6nderilerinizi veya genel profillerinizi g\u00f6zden ge\u00e7irerek OSINT tekniklerini kullanarak elde edebilirler.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Dosya Uzant\u0131lar\u0131n\u0131 G\u00f6ster \u00f6zelli\u011fini kullan\u0131n: Bu, doland\u0131r\u0131c\u0131lar\u0131n, bir dosyan\u0131n iki veya daha fazla uzant\u0131ya sahip gibi g\u00f6r\u00fcnd\u00fc\u011f\u00fc kafa kar\u0131\u015ft\u0131r\u0131c\u0131 bir teknik kullanmaya \u00e7al\u0131\u015ft\u0131\u011f\u0131 durumlarda yararl\u0131d\u0131r.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Bilinen k\u00f6t\u00fc niyetli Tor IP adreslerini engelleyin.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> Aciliyet duygusu yaratan e-postalara kar\u015f\u0131 dikkatli olun.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> 2FA do\u011frulamay\u0131 m\u00fcmk\u00fcn olan her sisteminizde kullan\u0131lmas\u0131n\u0131 sa\u011flay\u0131n.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> SSL uzant\u0131lar\u0131n\u0131 kontrol edin.<br><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">\u2022<\/mark><\/strong> URL y\u00f6nlendirmeleri konusunda dikkatli olmalar\u0131 konusunda uyar\u0131n.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">E\u011fitimler ile\u00a0<strong>phishing sald\u0131r\u0131lar\u0131<\/strong>n\u0131n etkilerinden azaltabiliriz ancak Verizon DBIR 2021 raporunda da belirtildi\u011fi \u00fczere tamamen kald\u0131rmak m\u00fcmk\u00fcn de\u011fildir. \u00d6rne\u011fin, 1148 kullan\u0131c\u0131ya ger\u00e7ek phishing epostas\u0131 ile sim\u00fcle edilmi\u015f\u00a0<strong>phishing epostas\u0131<\/strong>\u00a0g\u00f6nderiliyor. Kullan\u0131c\u0131lar simule epostaya hi\u00e7 t\u0131klamazken ger\u00e7ek phishing epostas\u0131na %2.5\u2019i t\u0131kl\u0131yor. Bu kapsamda, firma taraf\u0131nda phishing e-postalar\u0131n\u0131n personelinize ula\u015fmas\u0131n\u0131 \u00f6nlemek i\u00e7in katmanl\u0131 bir\u00a0<strong>siber g\u00fcvenlik<\/strong>\u00a0program\u0131 kullan\u0131lmas\u0131 gerekmektedir.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\">Phishing sald\u0131r\u0131s\u0131na hedef olduysan\u0131z neler yapmal\u0131s\u0131n\u0131z ?<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">E\u011fer sald\u0131r\u0131 yasal bir \u015firketle ili\u015fkiliyse (yani phishing sald\u0131r\u0131s\u0131nda g\u00f6nderilen e-posta tan\u0131nm\u0131\u015f bir e-ticaret sitesinden, finansal kurumdan, e-mail sa\u011flay\u0131c\u0131s\u0131ndan, internet hizmet sa\u011flay\u0131c\u0131s\u0131ndan geliyorsa) bu sald\u0131r\u0131y\u0131 ilgili \u015firkete bildirin. B\u00f6ylece, ilgili kuruma sahte web sitesini kapatma ve sald\u0131rgan\u0131n izini s\u00fcrmesini sa\u011flamak i\u00e7in yard\u0131mc\u0131 olabilirsiniz.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-luminous-vivid-orange-color\"><b>Doland\u0131r\u0131c\u0131l\u0131k \/ Phishing<\/b>&#8216;den  korunman\u0131n yollar\u0131<\/mark><\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">E-posta hesab\u0131n\u0131z i\u00e7in kulland\u0131\u011f\u0131n\u0131z \u015fifre, di\u011fer hesaplar\u0131n\u0131zdaki \u015fifrelerden farkl\u0131 olmal\u0131d\u0131r.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ki\u015fisel bilgilerinizi isteyen e-postalara yan\u0131t vermeyin.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Gelen e-postan\u0131n kimden geldi\u011finden emin de\u011filseniz dikkate almay\u0131n\u0131z. Unutmay\u0131n hi\u00e7 bir kurum veya kurulu\u015f e-posta yoluyla sizden ki\u015fisel bilgilerinizi istemez.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Sald\u0131r\u0131s\u0131 Nedir? Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nedir?, ger\u00e7ek web sitesi veya e-posta gibi g\u00f6r\u00fcnerek oturum a\u00e7ma kimlik bilgileri, kredi kart\u0131 numaralar\u0131, banka hesap numaralar\u0131 veya di\u011fer finansal bilgiler gibi hassas bilgileri ele&#8230;<\/p>\n","protected":false},"author":1,"featured_media":517,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[148],"tags":[152,18,151,19,20],"class_list":["post-88","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-teknoloji","tag-phishing-oltalama-saldirisi-nedir","tag-phishing-metodlari","tag-phishing-saldirilari-nasil-onlenebilir","tag-phishing-saldirisi","tag-phishing-saldirisi-nedir"],"_links":{"self":[{"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":1,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"predecessor-version":[{"id":518,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/posts\/88\/revisions\/518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/media\/517"}],"wp:attachment":[{"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kayizer.com\/blog\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}