{"id":3439,"date":"2015-08-13T12:58:48","date_gmt":"2015-08-13T16:58:48","guid":{"rendered":"http:\/\/aptgadget.com\/?p=3439"},"modified":"2015-08-16T00:31:35","modified_gmt":"2015-08-16T04:31:35","slug":"gone-phishing","status":"publish","type":"post","link":"https:\/\/aptgadget.com\/tr\/gone-phishing\/","title":{"rendered":"Kimlik Av\u0131 Ge\u00e7ti \u2013 \u00c7evrimi\u00e7i Verilerinizi Nas\u0131l Daha \u0130yi Korursunuz?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">G\u00fcn\u00fcm\u00fcz d\u00fcnyas\u0131nda siber g\u00fcvenlik son derece \u00f6nemlidir. Bilgisayar korsanlar\u0131 her sanal k\u00f6\u015fede pusuya yatm\u0131\u015f, sald\u0131rmak i\u00e7in bekliyor gibi g\u00f6r\u00fcn\u00fcyor. Durum tam olarak b\u00f6yle olmasa da, siber sald\u0131r\u0131lar\u0131n giderek daha s\u0131k ger\u00e7ekle\u015fti\u011fi g\u00f6r\u00fcl\u00fcyor. Bunun nedeni b\u00fcy\u00fck \u00f6l\u00e7\u00fcde b\u00fcy\u00fck \u015firketlere y\u00f6nelik y\u00fcksek profilli sald\u0131r\u0131lar\u0131n medyan\u0131n dikkatini \u00e7ekmesidir. Sony'nin me\u015fhur ihlali, Microsoft ve Playstation oyun a\u011flar\u0131n\u0131n DDOS'lanmas\u0131, hatta Federal H\u00fck\u00fcmet. Her sald\u0131r\u0131y\u0131 \u00e7evreleyen \u00e7ok say\u0131da teori vard\u0131r, ancak hepsi tek bir temel \u00f6\u011feye indirgenir. Korunan verilerin g\u00fcvensiz olmas\u0131.<\/span><\/p>\n<p>Hepimiz kendimizi korumak i\u00e7in yapabilece\u011fimiz temel \u015feylerin bir listesi oldu\u011funu bilsek de, bunlara neredeyse hi\u00e7 uymuyoruz. Bu konuda ben su\u00e7luyum. Hepimiz su\u00e7luyuz.<\/p>\n<p>Peki her \u015feyin birbirine ba\u011fl\u0131 oldu\u011fu bu d\u00fcnyada kendimizi nas\u0131l koruyaca\u011f\u0131z? Temel bilgilerle ba\u015flay\u0131n, kendinizi e\u011fitin ve sa\u011fduyunuzu kullan\u0131n. G\u00f6rmezden gelmeye meyilli oldu\u011fumuz \u015feylerin listesiyle ba\u015flayal\u0131m.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>G\u00fcncel Kal\u0131n! -<\/b><span style=\"font-weight: 400;\"> Bir i\u015fin ortas\u0131nda oldu\u011funuz i\u00e7in ka\u00e7 g\u00fcncellemeyi takip etmediniz? Antivir\u00fcs program\u0131n\u0131z\u0131 en son ne zaman g\u00fcncellediniz? Ya da \u00e7al\u0131\u015ft\u0131rd\u0131n\u0131z m\u0131? T\u00fcm programlar\u0131n\u0131z ve uygulamalar\u0131n\u0131z t\u00fcm cihazlar\u0131n\u0131zda g\u00fcncel mi?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Muhtemelen de\u011fil, benimkiler de de\u011fil, ama olmal\u0131lar ve i\u015fte nedeni:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bir arkada\u015f\u0131m i\u00e7in bir WordPress sitesi i\u015fletiyorum ve baz\u0131 \u00f6nemli eklentiler ge\u00e7mi\u015fte WordPress'in kendilerinden \u00f6nce g\u00fcncellenmesiyle sorunlara neden olmu\u015ftu. Uyumlulu\u011fu korumak i\u00e7in en son s\u00fcr\u00fcme g\u00fcncelleme yapmay\u0131 erteledim, ancak WordPress gruplar\u0131n\u0131n hackerlar taraf\u0131ndan alan\u0131mda b\u00fcy\u00fck bir e-ticaret sitesi yay\u0131nlamak i\u00e7in bana kar\u015f\u0131 kullan\u0131lmas\u0131n\u0131 sa\u011flad\u0131m.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu a\u00e7\u0131k, hacker'a sunucuma FTP eri\u015fimi sa\u011flad\u0131 ve sunucuya girdikten sonra her t\u00fcrl\u00fc sorunu yaratabilirsiniz. Tespit edildikten sonra temizlemeye ba\u015flad\u0131m, ancak dosya yap\u0131ma 150 binden fazla html ve javascript sayfas\u0131 yerle\u015ftirdiklerini ke\u015ffettim. 25 dizin derine g\u00f6m\u00fcl\u00fc bir betik yap\u0131lan de\u011fi\u015fiklikleri kontrol ediyor ve silinen her dosyay\u0131 y\u00fckl\u00fcyordu. Temizleme i\u015flemi sinir bozucu oldu. Tek yapt\u0131klar\u0131 \"gizli\" bir alan ad\u0131 kurmak oldu\u011fu i\u00e7in \u015fansl\u0131yd\u0131m, ancak felaket potansiyeli \u00e7ok b\u00fcy\u00fckt\u00fc ve g\u00fcncellemeleri iletmekten daha iyisini bildi\u011fim ger\u00e7e\u011fiyle daha da k\u00f6t\u00fcle\u015fti. <\/span><\/p>\n<ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>\u015eifreler - <\/b><span style=\"font-weight: 400;\">G\u00fc\u00e7l\u00fc parolalar kullan\u0131n ve bunlar\u0131 s\u0131k s\u0131k de\u011fi\u015ftirin! G\u00fc\u00e7l\u00fc bir parola \u015fu \u015fekilde tan\u0131mlan\u0131r <\/span><i><span style=\"font-weight: 400;\">\"En az karakter uzunlu\u011fundad\u0131r ve a\u015fa\u011f\u0131dakilerin her birinden bir veya daha fazlas\u0131n\u0131 kullan\u0131r: B\u00fcy\u00fck ve K\u00fc\u00e7\u00fck harfler, Rakamlar ve \u00d6zel Karakterler.\" <\/span><\/i><span style=\"font-weight: 400;\">\u00d6zellikle birden fazla \u00e7evrimi\u00e7i hesab\u0131n\u0131z varsa, bu \u00e7ok zor olabilir. <\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Bir ana parola belirlemenize olanak tan\u0131yan ve \u00e7evrimi\u00e7i hesaplar\u0131n\u0131z i\u00e7in giri\u015f bilgilerinizi y\u00f6neten parola y\u00f6neticileri vard\u0131r, ancak bu y\u00f6ntemi se\u00e7erseniz verilerinizi kime emanet etti\u011finize dikkat edin. Bu t\u00fcr \u015firketlere y\u00f6nelik \u00e7e\u015fitli sald\u0131r\u0131lar olmu\u015ftur, bu nedenle verilerinizi en az AES 256 bit \u015fifreleme ile \u015fifrelediklerinden emin olun. LastPass'i tavsiye ederim. Evet, yak\u0131n zamanda bir ihlal ya\u015fad\u0131lar ama <\/span><a href=\"https:\/\/lastpass.com\/support.php?cmd=showfaq&amp;id=1096\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">\u015fifreleme y\u00f6ntemleri<\/span><\/a><span style=\"font-weight: 400;\"> birinci s\u0131n\u0131f. <\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><b><b>\u015eI\u0307FRENI\u0307ZI\u0307 TEKRAR KULLANMAYIN!<\/b><span style=\"font-weight: 400;\"> Bunu takip etmenin zor oldu\u011funu biliyorum, ancak t\u00fcm \u00e7evrimi\u00e7i hesaplar\u0131n\u0131z i\u00e7in ayn\u0131 \u015fifreyi kullanmak riskli ve tehlikelidir, \u00f6zellikle de ayn\u0131 \u015fifreyi her \u015fey i\u00e7in kullan\u0131yorsan\u0131z (Bankac\u0131l\u0131k, \u0130\u015f, vb...). Ele ge\u00e7irilen bir hesap sald\u0131rganlara her \u015feyin sanal anahtar\u0131n\u0131 verir.<\/span><\/b><\/li>\n<\/ul>\n<ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Parolalar\u0131n\u0131z\u0131 taray\u0131c\u0131n\u0131za kaydetmeyin. K\u00f6t\u00fc niyetli bir web sayfas\u0131n\u0131 veya e-postay\u0131 a\u00e7mak gibi basit bir eylem, verilerinizi a\u00e7\u0131\u011fa \u00e7\u0131karan bir \"taray\u0131c\u0131 ele ge\u00e7irme\" sald\u0131r\u0131s\u0131na izin verebilir.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u015eifrelerinizi yazmay\u0131n ve g\u00f6r\u00fclebilecekleri veya bulunabilecekleri bir yerde b\u0131rakmay\u0131n. Bunun kula\u011fa nas\u0131l geldi\u011fini biliyorum ama yine de ge\u00e7erli bir endi\u015fe. Bir bilgisayar monit\u00f6r\u00fcn\u00fcn yan\u0131na \u00e7al\u0131\u015fanlar\u0131n kullan\u0131c\u0131 adlar\u0131 ve \u015fifrelerinin yaz\u0131l\u0131 oldu\u011fu ka\u011f\u0131tlar, klavyelerin alt\u0131na yap\u0131\u015ft\u0131r\u0131lm\u0131\u015f \u015fifreler, hatta hesap kimlik bilgileri ve URL'nin yaz\u0131l\u0131 oldu\u011fu yap\u0131\u015fkan notlar g\u00f6rd\u00fcm!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">M\u00fcmk\u00fcn olan her yerde \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama kullan\u0131n. Ben Google Authenticator gibi bir \u00e7\u00f6z\u00fcm kullanmay\u0131 tercih ediyorum. Kimli\u011finizi do\u011frulamak i\u00e7in k\u0131sa \u00f6m\u00fcrl\u00fc, tek kullan\u0131ml\u0131k bir kod sa\u011flar. Kodu belirtilen s\u00fcre i\u00e7inde girmezseniz, kod de\u011fi\u015fir ve tekrar kullan\u0131lamaz.<\/span><\/li>\n<\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><b><b>Bir AntiVir\u00fcs Kurun, Kullan\u0131n ve G\u00fcncelleyin - <\/b><span style=\"font-weight: 400;\">Bu zorunludur!<\/span><span style=\"font-weight: 400;\"> Antivir\u00fcs ve AntiMalware \u00e7\u00f6z\u00fcmleri bula\u015fmadan \u00f6nceki son savunma hatt\u0131n\u0131zd\u0131r. Bunlar\u0131 en son tan\u0131mlarla g\u00fcncel tutmak korunman\u0131za yard\u0131mc\u0131 olacakt\u0131r. Her yerde \u00fccretsiz se\u00e7enekler vard\u0131r ve Microsoft Security Essentials (\u015fa\u015f\u0131rt\u0131c\u0131 bir \u015fekilde ger\u00e7ekten iyidir) \u00e7o\u011fu Windows sisteminde \u00f6nceden y\u00fcklenmi\u015f olarak gelir. En iyi se\u00e7enekler \"durum tabanl\u0131\" programlard\u0131r, yani bilgisayar\u0131n\u0131z ger\u00e7ek zamanl\u0131 olarak izlenir. Durum tabanl\u0131 yaz\u0131l\u0131mlar sizi izinsiz giri\u015fler, yetkisiz y\u00fcklemeler ve hatta k\u00f6t\u00fc ama\u00e7l\u0131 web siteleri konusunda uyarabilir. Her \u00fcr\u00fcnde oldu\u011fu gibi, \u00e7o\u011fu durumda \u00f6dedi\u011finizin kar\u015f\u0131l\u0131\u011f\u0131n\u0131 al\u0131rs\u0131n\u0131z, bu nedenle kullan\u0131c\u0131 yorumlar\u0131n\u0131 kar\u015f\u0131la\u015ft\u0131r\u0131n. \u015eahsen ben a\u015fa\u011f\u0131dakilerin bir kombinasyonunu kullan\u0131yorum <\/span><a href=\"http:\/\/www.comodo.com\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Comodo AV ve G\u00fcvenlik Duvar\u0131<\/span><\/a><span style=\"font-weight: 400;\">ve <\/span><a href=\"https:\/\/www.malwarebytes.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">MalwareBytes AntiMalware<\/span><\/a><span style=\"font-weight: 400;\">.\n<p><\/span><\/b><\/li>\n<\/ul>\n<ul>\n<li><b><b>G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rma ve Kullanma - <\/b><span style=\"font-weight: 400;\">Yine, verilerinize yetkisiz eri\u015fimi \u00f6nlemek i\u00e7in bu \u00e7ok \u00f6nemlidir. Windows kullan\u0131yorsan\u0131z, Windows G\u00fcvenlik Duvar\u0131 m\u00fckemmel bir se\u00e7imdir. \u0130htiyac\u0131n\u0131z olmayan veya kullanmad\u0131\u011f\u0131n\u0131z t\u00fcm hizmetleri engellemeniz \u00f6nerilir. \u0130lk yapt\u0131\u011f\u0131m \u015feylerden biri 23, 69 ve 3389 numaral\u0131 ba\u011flant\u0131 noktalar\u0131n\u0131 kapatmakt\u0131r (bu hizmetleri y\u00f6nlendiricimde de engellerim). Bu, birisinin sistemlerime kar\u015f\u0131 k\u00f6t\u00fc niyetli olarak Telnet, TFTP veya RDP kullanma olas\u0131l\u0131\u011f\u0131n\u0131 ortadan kald\u0131r\u0131r.\n<p><\/span><\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Kablosuz Y\u00f6nlendiricinizi Yap\u0131land\u0131rma -<\/b><span style=\"font-weight: 400;\"> Bir\u00e7ok kez bir kablosuz eri\u015fim noktas\u0131na giri\u015f yapmak i\u00e7in gitti\u011fimde \"NetGear\", \"LinkSys\" veya benzeri isimlerle dolu bir liste g\u00f6rd\u00fcm. Bu a\u011flar sald\u0131r\u0131ya maruz kalabilir. Sava\u015f S\u00fcr\u00fcc\u00fcl\u00fc\u011f\u00fc baz\u0131lar\u0131 i\u00e7in pop\u00fcler bir faaliyet haline geliyor. Bu, sadece bir e-postay\u0131 kontrol etmek veya g\u00f6ndermek i\u00e7in a\u00e7\u0131k bir Wi-Fi'ye girmek isteyen biri olabilir veya \u00e7ok daha k\u00f6t\u00fc bir \u015fey olabilir, ancak her iki \u015fekilde de \u00f6nlenebilir (ve \u00f6nlenmelidir). Y\u00f6nlendiricinizi yap\u0131land\u0131rmak i\u00e7in zaman ay\u0131r\u0131n.<br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SSID ad\u0131n\u0131 de\u011fi\u015ftirin ya da daha iyisi de\u011fi\u015ftirin ve ard\u0131ndan gizleyin. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hem wi-fi hem de y\u00f6nlendirici y\u00f6netimi i\u00e7in yeni bir \u015fifre olu\u015fturun, \u00f6zellikle y\u00f6nlendirici y\u00f6netimi i\u00e7in varsay\u0131lan \u015fifreleri kullanmay\u0131n. \u00c7o\u011fu basit\u00e7e Kullan\u0131c\u0131 ad\u0131: admin<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\u015eifre: password<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Bunlar hi\u00e7bir koruma sa\u011flamaz ve neredeyse t\u00fcm \u00fcreticiler i\u00e7in internette kolayca bulunabilir.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">WPS'yi (Wi-Fi Korumal\u0131 Kurulum) kapat\u0131n. Bu d\u00fc\u011fmeli ba\u011flant\u0131, a\u011f\u0131n\u0131za ba\u011flanman\u0131n en az g\u00fcvenli y\u00f6ntemidir. Ayr\u0131ca a\u011f\u0131n\u0131z\u0131n SSID'sini ve pinini dinleyen herkese g\u00f6nderir.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">WPA2 \u015fifreleme kullan\u0131n. Daha az\u0131n\u0131n hacklenmesi son derece kolayd\u0131r. Eski cihazlar i\u00e7in WEP kullanman\u0131z gerekiyorsa, \u00f6zellikle bu \u015fifreleme t\u00fcr\u00fc i\u00e7in bir misafir a\u011f\u0131 kurmay\u0131 deneyin. Misafir a\u011f\u0131, ana a\u011f\u0131n\u0131z\u0131 daha g\u00fc\u00e7l\u00fc \u015fifreleme ile korurken eski cihazlar\u0131n\u0131z\u0131n ba\u011flanmas\u0131na izin verecektir.\n<p><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Sa\u011fduyunuzu Kullan\u0131n -<\/b><span style=\"font-weight: 400;\"> Az \u00f6nce ald\u0131\u011f\u0131n\u0131z ve Nairobi'de \u00f6len akraban\u0131z\u0131n bir Prens oldu\u011funu ve size ABD para birimi cinsinden milyonlar b\u0131rakt\u0131\u011f\u0131n\u0131 s\u00f6yleyen e-postay\u0131 biliyor musunuz? Bu serveti talep edebilirsiniz, tek yapman\u0131z gereken banka hesap bilgilerinizi, Sosyal G\u00fcvenlik Numaran\u0131z\u0131 ve adresinizi g\u00f6ndermek. - Evet, g\u00f6ndermeyin. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Yukar\u0131dakiler son derece a\u00e7\u0131k olsa da, t\u00fcm giri\u015fimler \u00f6yle de\u011fildir. Son zamanlardaki ba\u015far\u0131l\u0131 sald\u0131r\u0131lar bunun kan\u0131t\u0131d\u0131r. Bankac\u0131l\u0131k kurumunuzdan gelen ve a\u015fa\u011f\u0131daki ba\u011flant\u0131dan giri\u015f yapman\u0131z\u0131 s\u00f6yleyen ya da ba\u015fka bir g\u00fcvenilir siteden kimlik bilgilerinizi isteyen e-postalar g\u00f6rebilirsiniz. Bu taktik, k\u00f6t\u00fc niyetli i\u00e7erik g\u00f6ndermek i\u00e7in g\u00fcvenilir bir kaynak kullanarak \"Oltalama\" olarak bilinir ve olduk\u00e7a ba\u015far\u0131l\u0131 olmu\u015ftur. Yak\u0131n tarihli bir \u00f6rnek <\/span><a href=\"http:\/\/money.cnn.com\/2014\/12\/19\/technology\/security\/icann-hack-internet\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ICANN<\/span><\/a><span style=\"font-weight: 400;\"> hack. Bilmeyenler i\u00e7in, ICANN nihai internet otoritesidir. <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">E-postalardaki ba\u011flant\u0131lara ve eklere dikkat edin. En g\u00fcvenilir i\u015fletmeler, bankalar ve hizmetler <\/span><b><i>asla <\/i><\/b><span style=\"font-weight: 400;\">bir e-postada kimlik bilgilerinizi isteyin.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Bir e-postan\u0131n kaynakland\u0131\u011f\u0131 etki alan\u0131n\u0131 g\u00f6rmek i\u00e7in g\u00f6nderen adresinin \u00fczerine gelin, sahte e-posta adresleri k\u00f6t\u00fc niyetli ileti\u015fimlerde s\u0131k\u00e7a kar\u015f\u0131la\u015f\u0131lan bir durumdur.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Eklere dikkat edin! Bu, antivir\u00fcs ve g\u00fcvenlik duvarlar\u0131n\u0131n neden bu kadar \u00f6nemli oldu\u011funun en iyi \u00f6rne\u011fidir.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Bir mesaj\u0131n konusuna ve i\u00e7eri\u011fine dikkat edin. Arkada\u015f\u0131n\u0131z size karmakar\u0131\u015f\u0131k bir metin ve ba\u011flant\u0131 karma\u015fas\u0131yla dolu garip bir mesaj g\u00f6nderdi. Sak\u0131n a\u00e7may\u0131n.\n<p><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Kendinizi E\u011fitin! -<\/b><span style=\"font-weight: 400;\"> Yukar\u0131daki bilgilerin t\u00fcm\u00fc yar\u0131n ge\u00e7erlili\u011fini yitirmi\u015f olabilir! Sizi etkileyebilecek konularda g\u00fcncel kal\u0131n. B\u00fcy\u00fck medya kurulu\u015flar\u0131 yeni ortaya \u00e7\u0131kan tehditleri haber yapmazlar. Kendilerine en \u00e7ok ilgi \u00e7ekecek konulara odaklan\u0131rlar. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\"Joe Smith'e bir k\u0131sa mesaj\u0131n i\u00e7ine gizlenmi\u015f yepyeni bir vir\u00fcs bula\u015ft\u0131 (<\/span><a href=\"https:\/\/blog.zimperium.com\/stagefright-vulnerability-details-stagefright-detector-tool-released\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Sahne korkusu<\/span><\/a><span style=\"font-weight: 400;\">), ancak Huge Corporation Inc g\u00fcvenli olmayan bir web sunucusu \u00fczerinden sald\u0131r\u0131ya u\u011frad\u0131. \u0130nsanlar Huge Corporation Inc'i seviyor! Bunu haber yapal\u0131m!\"<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\u0130nternette kelimenin tam anlam\u0131yla binlerce g\u00fcvenlik tabanl\u0131 blog, site, grup ve haber b\u00fclteni var. Birka\u00e7\u0131n\u0131 takip edin ve g\u00fcncel kal\u0131n.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;<\/p>","protected":false},"author":14,"featured_media":3444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[928],"tags":[],"class_list":["post-3439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gone Phishing - How To Better Secure your Online Data - AptGadget.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aptgadget.com\/tr\/gone-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gone Phishing - How To Better Secure your Online Data\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aptgadget.com\/tr\/gone-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"AptGadget.com\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-13T16:58:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-16T04:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\" \/>\n\t<meta property=\"og:image:width\" content=\"638\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carl &quot;CyberArcher&quot; L.\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carl &quot;CyberArcher&quot; L.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\"},\"author\":{\"name\":\"Carl \\\"CyberArcher\\\" L.\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\"},\"headline\":\"Gone Phishing &#8211; How To Better Secure your Online Data\",\"datePublished\":\"2015-08-13T16:58:48+00:00\",\"dateModified\":\"2015-08-16T04:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\"},\"wordCount\":1446,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"articleSection\":[\"Tech Tips\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/aptgadget.com\/gone-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\",\"url\":\"https:\/\/aptgadget.com\/gone-phishing\/\",\"name\":\"Gone Phishing - How To Better Secure your Online Data - AptGadget.com\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"datePublished\":\"2015-08-13T16:58:48+00:00\",\"dateModified\":\"2015-08-16T04:31:35+00:00\",\"author\":{\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\"},\"breadcrumb\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aptgadget.com\/gone-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\",\"url\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"contentUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"width\":638,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/aptgadget.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gone Phishing &#8211; How To Better Secure your Online Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aptgadget.com\/#website\",\"url\":\"https:\/\/aptgadget.com\/\",\"name\":\"AptGadget.com\",\"description\":\"Technology Reviews, Products and News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aptgadget.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\",\"name\":\"Carl \\\"CyberArcher\\\" L.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g\",\"caption\":\"Carl \\\"CyberArcher\\\" L.\"},\"description\":\"Carl is an Android enthusiast that got his start with an HTC Hero. Quickly tiring of not being able to change certain things about the device, he sought out the means to do what he wanted; Enter XDA Developers. After spending immense amounts of time on the forums learning, building and sharing, Carl decided to pursue higher education to increase his understanding and focus on a direction in the mobile world. Primarily focusing on security and privacy, Carl intends to gain his CEH and Reverse Engineer malware.\",\"url\":\"https:\/\/aptgadget.com\/tr\/author\/l1tc4rl\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gone Phishing - How To Better Secure your Online Data - AptGadget.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aptgadget.com\/tr\/gone-phishing\/","og_locale":"tr_TR","og_type":"article","og_title":"Gone Phishing - How To Better Secure your Online Data","og_description":"In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;","og_url":"https:\/\/aptgadget.com\/tr\/gone-phishing\/","og_site_name":"AptGadget.com","article_published_time":"2015-08-13T16:58:48+00:00","article_modified_time":"2015-08-16T04:31:35+00:00","og_image":[{"width":638,"height":638,"url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","type":"image\/png"}],"author":"Carl \"CyberArcher\" L.","twitter_misc":{"Yazan:":"Carl \"CyberArcher\" L.","Tahmini okuma s\u00fcresi":"7 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aptgadget.com\/gone-phishing\/#article","isPartOf":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/"},"author":{"name":"Carl \"CyberArcher\" L.","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63"},"headline":"Gone Phishing &#8211; How To Better Secure your Online Data","datePublished":"2015-08-13T16:58:48+00:00","dateModified":"2015-08-16T04:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/"},"wordCount":1446,"commentCount":0,"image":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","articleSection":["Tech Tips"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/aptgadget.com\/gone-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/aptgadget.com\/gone-phishing\/","url":"https:\/\/aptgadget.com\/gone-phishing\/","name":"Gone Phishing - How To Better Secure your Online Data - AptGadget.com","isPartOf":{"@id":"https:\/\/aptgadget.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"image":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","datePublished":"2015-08-13T16:58:48+00:00","dateModified":"2015-08-16T04:31:35+00:00","author":{"@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63"},"breadcrumb":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aptgadget.com\/gone-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage","url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","contentUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","width":638,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aptgadget.com\/"},{"@type":"ListItem","position":2,"name":"Gone Phishing &#8211; How To Better Secure your Online Data"}]},{"@type":"WebSite","@id":"https:\/\/aptgadget.com\/#website","url":"https:\/\/aptgadget.com\/","name":"AptGadget.com","description":"Technology Reviews, Products and News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aptgadget.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63","name":"Carl \"CyberArcher\" L.","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g","caption":"Carl \"CyberArcher\" L."},"description":"Carl is an Android enthusiast that got his start with an HTC Hero. Quickly tiring of not being able to change certain things about the device, he sought out the means to do what he wanted; Enter XDA Developers. After spending immense amounts of time on the forums learning, building and sharing, Carl decided to pursue higher education to increase his understanding and focus on a direction in the mobile world. Primarily focusing on security and privacy, Carl intends to gain his CEH and Reverse Engineer malware.","url":"https:\/\/aptgadget.com\/tr\/author\/l1tc4rl\/"}]}},"_links":{"self":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/3439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/comments?post=3439"}],"version-history":[{"count":4,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/3439\/revisions"}],"predecessor-version":[{"id":3481,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/3439\/revisions\/3481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/media\/3444"}],"wp:attachment":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/media?parent=3439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/categories?post=3439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/tags?post=3439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}