{"id":3193,"date":"2023-04-15T00:01:29","date_gmt":"2023-04-14T21:01:29","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3193"},"modified":"2023-05-18T21:00:55","modified_gmt":"2023-05-18T18:00:55","slug":"malware","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/malware\/","title":{"rendered":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?"},"content":{"rendered":"\n<p>Her internet kullan\u0131c\u0131s\u0131, veri ve donan\u0131mlar\u0131n\u0131 tehlikeye atabilecek potansiyel \u00e7evrimi\u00e7i tehditlerin fark\u0131nda olmal\u0131d\u0131r. Fark\u0131nda olmas\u0131 gereken en \u00f6nemli \u015feylerden biri de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r.<\/p>\n\n\n\n<p>Peki malware tam olarak nedir?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware Nedir?&nbsp;<\/h2>\n\n\n\n<p><strong>Malware<\/strong> yani<strong> k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m<\/strong>, herhangi bir programlanabilir cihaza, sunucuya veya a\u011fa zarar vermek veya bunlardan yararlanmak i\u00e7in tasarlanm\u0131\u015f bilgisayarl\u0131 koddur. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n amac\u0131, eri\u015fimin engellenmesi, verilerin yok edilmesi veya \u00e7al\u0131nmas\u0131, bilgisayar kaynaklar\u0131n\u0131n ele ge\u00e7irilmesi, yanl\u0131\u015f bilgilerin yay\u0131lmas\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n yay\u0131lmas\u0131 ve di\u011fer bir\u00e7ok zararl\u0131 eylem dahil olmak \u00fczere bir\u00e7ok \u015fekilde olabilir. Siber su\u00e7lular\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yayma motivasyonu para, casusluk veya bilgi h\u0131rs\u0131zl\u0131\u011f\u0131 ya da bir rakibe veya d\u00fc\u015fmana zarar vermek olabilir.<\/p>\n\n\n\n<p>Art\u0131k internet \u00fczerinden ba\u011flanan milyonlarca programlanabilir cihazla, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, siber su\u00e7 end\u00fcstrisinin b\u00fcy\u00fcyen bir par\u00e7as\u0131d\u0131r. Siber su\u00e7lular, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 \u00e7e\u015fitli \u015fekillerde da\u011f\u0131t\u0131r:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Pop\u00fcler bir web sitesine bula\u015f\u0131r ve ard\u0131ndan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 ziyaret\u00e7ilere bula\u015ft\u0131r\u0131r.<\/li><li>Me\u015fru bir dosya gibi g\u00f6r\u00fcnen e-posta\u2019lara k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ekler.<\/li><li>Programlama yard\u0131mc\u0131 programlar\u0131 veya yaz\u0131l\u0131m g\u00fcncellemeleri gibi g\u00fcvenilir uygulama ve ara\u00e7lara k\u00f6t\u00fc ama\u00e7l\u0131 kod ekler.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bir vir\u00fcs m\u00fc?<\/h2>\n\n\n\n<p>T\u00fcm vir\u00fcsler k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131r, ancak her malware t\u00fcr\u00fc vir\u00fcs de\u011fildir. Vir\u00fcsler, kodlar\u0131n\u0131 ba\u015fka dosya veya programlara ekleyerek ve ard\u0131ndan vir\u00fcs bula\u015fm\u0131\u015f bir cihazdan di\u011ferine yay\u0131larak kendi kendini \u00e7o\u011faltan bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcr\u00fcd\u00fcr.<\/p>\n\n\n\n<p>Bir bula\u015fman\u0131n ba\u015fka t\u00fcr bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan m\u0131 yoksa bir vir\u00fcsten mi kaynakland\u0131\u011f\u0131n\u0131 bilmek i\u00e7in nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131na bakman\u0131z gerekir. Kendini kopyalamak ve yaymak i\u00e7in ba\u015fka programlar kullanm\u0131yorsa, o zaman vir\u00fcs de\u011fildir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Ne Yapabilir ve Ne Kadar Tehlikelidir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir.jpeg\" alt=\"K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Ne Yapabilir ve Ne Kadar Tehlikelidir?\" class=\"wp-image-3210\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-ne-yapabilir-ve-ne-kadar-tehlikelidir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131, zay\u0131f parolalar\u0131 k\u0131rabilir, sistemlerin derinliklerine inebilir, a\u011flara yay\u0131labilir ve bir i\u015fletmenin g\u00fcnl\u00fck operasyonlar\u0131n\u0131 bozabilir. Di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcrleri, \u00f6nemli dosyalar\u0131 kilitleyebilir, size reklamlar g\u00f6nderebilir, bilgisayar\u0131n\u0131z\u0131 yava\u015flatabilir veya sizi k\u00f6t\u00fc ama\u00e7l\u0131 web sitelerine y\u00f6nlendirebilir.<\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, yayg\u0131n kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 ve doland\u0131r\u0131c\u0131l\u0131\u011fa yol a\u00e7an b\u00fcy\u00fck \u00f6l\u00e7ekli veri ihlalleri de dahil olmak \u00fczere \u00e7o\u011fu siber sald\u0131r\u0131n\u0131n temelinde yer al\u0131r. Milyonlarca dolarl\u0131k zarara yol a\u00e7an fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131n\u0131n da arkas\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar vard\u0131r. Bilgisayar korsanlar\u0131, bireylere, \u015firketlere ve hatta devletlere y\u00f6nelik k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131n\u0131 hedefler.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<p>Malware\u2019in \u00e7al\u0131\u015fmas\u0131 i\u00e7in genellikle \u00f6nce yaz\u0131l\u0131m\u0131 bilgisayar\u0131n\u0131za y\u00fcklemek i\u00e7in bir \u015feyler yapman\u0131z gerekir. Bu, bir ba\u011flant\u0131ya t\u0131klamak, bir eki a\u00e7mak veya vir\u00fcsl\u00fc bir web sitesini ziyaret etmek anlam\u0131na gelir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m makinenize girdikten sonra ger\u00e7ekle\u015ftirmek i\u00e7in tasarland\u0131\u011f\u0131 g\u00f6revi ba\u015flat\u0131r: verilerinizi \u00e7almak, dosyalar\u0131n\u0131z\u0131 \u015fifrelemek, ek k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklemek vb.<\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, tespit edilip kald\u0131r\u0131lana kadar sisteminizde kal\u0131r. Ayr\u0131ca baz\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, sahip olabilece\u011finiz t\u00fcm vir\u00fcsten koruma uygulamalar\u0131n\u0131 veya di\u011fer g\u00fcvenlik ara\u00e7lar\u0131n\u0131 engellemeye veya bunlardan saklanmaya \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Sald\u0131r\u0131 T\u00fcrleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri.jpeg\" alt=\"K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Sald\u0131r\u0131 T\u00fcrleri\" class=\"wp-image-3211\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/kotu-amacli-yazilim-saldiri-turleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131, bilgisayar korsan\u0131n\u0131n ba\u015farmay\u0131 umdu\u011fu \u015feye ba\u011fl\u0131 olarak genellikle be\u015f kategoriden birine girer:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Casus yaz\u0131l\u0131m ve reklam yaz\u0131l\u0131m\u0131 (Spyware ve adware)<\/h3>\n\n\n\n<p>Adware, bir kullan\u0131c\u0131n\u0131n g\u00f6z atma al\u0131\u015fkanl\u0131klar\u0131 hakk\u0131nda bilgi toplar ve kullan\u0131c\u0131ya pop-up reklamlar g\u00f6nderir. Casus yaz\u0131l\u0131m ayr\u0131ca, bazen kullan\u0131c\u0131n\u0131n web tarama ge\u00e7mi\u015fi gibi bilgileri, parolalar ve hesap numaralar\u0131 gibi daha hassas verileri de toplar. Baz\u0131 durumlarda casus yaz\u0131l\u0131m, m\u00fc\u015fteri listeleri veya mali raporlar gibi gizli i\u00e7erikleri arayabilir. Casus yaz\u0131l\u0131mlar ve reklam yaz\u0131l\u0131mlar\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan koruma programlar\u0131 da dahil olmak \u00fczere genellikle me\u015fru uygulamalar gibi g\u00f6r\u00fcn\u00fcr.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Botnet k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 (Botnet malware)<\/h3>\n\n\n\n<p>Botnet k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131, ele ge\u00e7irilmi\u015f bilgisayarlardan olu\u015fan ve uzaktan kontrol edilebilen a\u011flar olu\u015fturur. Bot a\u011flar\u0131 olarak adland\u0131r\u0131lan bu a\u011flar, t\u00fcm\u00fc a\u015fa\u011f\u0131daki k\u00f6t\u00fc ama\u00e7l\u0131 etkinliklerden birini y\u00fcr\u00fcten y\u00fczlerce veya binlerce bilgisayardan olu\u015fabilir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Spam e-posta g\u00f6nderme<\/li><li>Madencilik kripto para birimleri<\/li><li>Bir i\u015fletmenin a\u011f\u0131n\u0131 bozmak veya devre d\u0131\u015f\u0131 b\u0131rakmak i\u00e7in da\u011f\u0131t\u0131lm\u0131\u015f hizmet reddi (DDoS) sald\u0131r\u0131lar\u0131 ba\u015flatma<\/li><li>Daha fazla botnet olu\u015fturmak i\u00e7in k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da\u011f\u0131tma<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">3. Fidye yaz\u0131l\u0131m\u0131 (Ransomware)<\/h3>\n\n\n\n<p>Fidye yaz\u0131l\u0131mlar\u0131, 2016 y\u0131l\u0131nda bir fidye yaz\u0131l\u0131m\u0131 dalgas\u0131n\u0131n d\u00fcnya \u00e7ap\u0131nda \u015fifrelenmi\u015f bilgisayarlar\u0131 istismar etmesi ve onlar\u0131 Bitcoin veya di\u011fer kripto para birimleriyle \u00f6deme i\u00e7in rehin tutmas\u0131yla \u00f6ne \u00e7\u0131km\u0131\u015ft\u0131r. En pop\u00fclerlerinden biri, U.K. National Health Service&nbsp;(NHS) de dahil olmak \u00fczere d\u00fcnyan\u0131n d\u00f6rt bir yan\u0131ndaki b\u00fcy\u00fck kurulu\u015flar\u0131 etkileyen May\u0131s 2017\u2019deki WannaCry\/WannaCryptor fidye yaz\u0131l\u0131m\u0131d\u0131r. Bu sald\u0131r\u0131da bilgisayar korsanlar\u0131, anahtar\u0131 her zaman teslim etmeseler de, her bilgisayar\u0131n \u015fifre \u00e7\u00f6zme anahtar\u0131 i\u00e7in 300 dolarl\u0131k bitcoin talep etmi\u015ftir. Sonu\u00e7 olarak fidye yaz\u0131l\u0131m\u0131 NHS hastanelerini kapatt\u0131 ve de\u011ferli verilerini kaybeden y\u00fczbinlerce kurulu\u015f ve ki\u015fiyi etkiledi. 2018&#8217;de, bilgisayar korsanlar\u0131 \u00e7abalar\u0131n\u0131 kripto h\u0131rs\u0131zl\u0131\u011f\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131na odaklad\u0131k\u00e7a, fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 azald\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Cryptojacking veya kripto madencili\u011fi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 (Cryptojacking veya cryptomining malware)<\/h3>\n\n\n\n<p>Cryptojacking veya kripto madencili\u011fi yapan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kripto para madencili\u011fi yapmak i\u00e7in bir bilgisayar veya bilgisayar a\u011f\u0131n\u0131 ele ge\u00e7irmeyi i\u00e7erir. Madencilik programlar\u0131 b\u00fcy\u00fck miktarlarda i\u015flem g\u00fcc\u00fc, bant geni\u015fli\u011fi ve enerji kullan\u0131r. Hedeflenen ki\u015filer, bedelini me\u015fru kullan\u0131mlar\u0131 i\u00e7in azalan i\u015flem g\u00fcc\u00fc ve artan elektrik maliyetleriyle \u00f6der. A\u015f\u0131r\u0131 veri s\u0131k\u0131\u015ft\u0131rma, hedeflenen ki\u015finin donan\u0131m\u0131na da zarar verebilir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131lar\u0131 ayr\u0131ca verileri \u00e7alabilir, de\u011fi\u015ftirebilir veya gelecekte kullan\u0131lmak \u00fczere ba\u015fka k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar yerle\u015ftirebilir. Baz\u0131 cryptojacker&#8217;lar hedeflenen ki\u015filerin kendi siber para birimlerini de \u00e7alar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m (Fileless malware)<\/h3>\n\n\n\n<p>Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, sadece bilgisayar\u0131n belle\u011finde \u00e7al\u0131\u015f\u0131r ve vir\u00fcsten koruma yaz\u0131l\u0131m\u0131n\u0131n bulmas\u0131 i\u00e7in hi\u00e7bir dosya b\u0131rakmaz. RogueRobin Operasyonu, dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131na bir \u00f6rnektir. RogueRobin, k\u00f6t\u00fc ama\u00e7l\u0131 Microsoft Excel Web Query dosyalar\u0131 i\u00e7eren bir kimlik av\u0131 e-posta\u2019s\u0131yla ba\u015flar. Bu dosyalar, bilgisayar\u0131 PowerShell komut dosyalar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131rmaya zorlar ve bu da bilgisayar korsan\u0131na hedeflenen ki\u015finin sistemine arka kap\u0131 sa\u011flar. Bilgisayar kapat\u0131ld\u0131\u011f\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ortadan kalksa da arka kap\u0131 kal\u0131r.<\/p>\n\n\n\n<p>Dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m korsanlar\u0131, PowerShell, Excel veya Windows Y\u00f6netim Ara\u00e7lar\u0131 gibi g\u00fcvenilir teknolojileri kullanarak geleneksel g\u00fcvenlik yaz\u0131l\u0131mlar\u0131ndan kurtulabilir.<\/p>\n\n\n\n<p>Baz\u0131 uygulamalar s\u00fcrekli \u00e7al\u0131\u015facak \u015fekilde tasarland\u0131\u011f\u0131ndan, dosyas\u0131z bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m komut dosyas\u0131 g\u00fcnler, haftalar veya daha uzun s\u00fcre \u00e7al\u0131\u015fabilir. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Korumas\u0131 \u0130\u00e7in En \u0130yi Uygulamalar<\/h2>\n\n\n\n<p>Daha iyi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m korumas\u0131 i\u00e7in bireylerin ve i\u015fletmelerin uygulayabilece\u011fi ba\u015fl\u0131ca stratejiler a\u015fa\u011f\u0131dad\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Verileri s\u0131k s\u0131k yedekleyin<\/h3>\n\n\n\n<p>Bir dosya veya veri taban\u0131 bozulursa, yak\u0131n tarihli bir yedekten geri y\u00fcklenebilir. Bu nedenle, belirli bir s\u00fcre boyunca birden fazla yedekleme yap\u0131n. Ayr\u0131ca, d\u00fczg\u00fcn \u00e7al\u0131\u015ft\u0131klar\u0131ndan emin olmak i\u00e7in yedeklemeleri d\u00fczenli olarak test edin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Makrolar\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n<\/h3>\n\n\n\n<p>Gerekli olmayan y\u00f6netim ara\u00e7lar\u0131n\u0131 ve taray\u0131c\u0131 eklentilerini devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m alg\u0131lama yaz\u0131l\u0131m\u0131n\u0131 kurun ve g\u00fcncelleyin<\/h3>\n\n\n\n<p>Geli\u015fmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m alg\u0131lama program ve hizmetleri, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 alg\u0131lamak ve bunlara yan\u0131t vermek i\u00e7in a\u015fa\u011f\u0131dakiler dahil birden \u00e7ok y\u00f6ntem kullan\u0131r:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Karantinaya al\u0131nm\u0131\u015f bir ortamda \u015f\u00fcpheli bir vir\u00fcs\u00fc korumal\u0131 alana alma veya etkinle\u015ftirme<\/li><li>\u0130tibar filtrelemesi yapmak (\u00f6rne\u011fin, g\u00f6nderen IP adresinin itibar\u0131na g\u00f6re filtrelemek)<\/li><li>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131, bilinen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n \u00f6zellikleriyle kar\u015f\u0131la\u015ft\u0131rarak belirlemek i\u00e7in imza tabanl\u0131 filtreleme kullanma<\/li><li>Normal kullan\u0131c\u0131 davran\u0131\u015f\u0131n\u0131n profilini \u00e7\u0131karmak ve uygulamalar\u0131n anormal kullan\u0131m\u0131n\u0131 tespit etmek i\u00e7in yapay zeka ve makine \u00f6\u011frenimini kullanan davran\u0131\u015fa dayal\u0131 analiz yaz\u0131l\u0131m\u0131 kullanmak<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tehditleri hakk\u0131nda bilgi edinin<\/h3>\n\n\n\n<p>Herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fmas\u0131n\u0131 \u00f6nlemede en \u00f6nemli fakt\u00f6r, kullan\u0131c\u0131lar\u0131n kendisidir. Kullan\u0131c\u0131lar\u0131n, yetkisiz uygulamalar\u0131 indirip kurman\u0131n, bilgisayarlar\u0131na USB flash s\u00fcr\u00fcc\u00fcler takman\u0131n veya g\u00fcvenilmeyen web sitelerine g\u00f6z atman\u0131n risklerinin fark\u0131nda olmalar\u0131 gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. G\u00fcvenli internet ve sosyal medya uygulamalar\u0131 konusunda kullan\u0131c\u0131 e\u011fitimleri \u00f6nerilir<\/h3>\n\n\n\n<p>Kullan\u0131c\u0131lar, en son k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tehditlerine ili\u015fkin d\u00fczenli bilgi g\u00fcncellemelerinin yan\u0131 s\u0131ra g\u00fcvenlik uygulamalar\u0131na ili\u015fkin hat\u0131rlat\u0131c\u0131lardan yararlan\u0131r.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cihazlar\u0131n\u0131z\u0131 K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlara Kar\u015f\u0131 Nas\u0131l Korursunuz?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz.jpeg\" alt=\"Cihazlar\u0131n\u0131z\u0131 K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlara Kar\u015f\u0131 Nas\u0131l Korursunuz?\" class=\"wp-image-3212\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/cihazlarinizi-kotu-amacli-yazilimlara-karsi-nasil-korursunuz-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Bir ba\u011flant\u0131y\u0131 daha dikkatli incelemeden a\u00e7mak veya yaz\u0131l\u0131m\u0131n\u0131z\u0131 g\u00fcncellememek kontrol\u00fcn\u00fczde olan bir \u015feydir, bu nedenle daha dikkatli olabilir ve hatalardan ka\u00e7\u0131nabilirsiniz. <\/p>\n\n\n\n<p>Peki bunlar\u0131n d\u0131\u015f\u0131nda cihazlar\u0131n\u0131z\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan korumak i\u00e7in neler yapman\u0131z gerekir?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>G\u00fc\u00e7l\u00fc parolalar kullan\u0131n<\/strong> &#8211; K\u00fc\u00e7\u00fck ve b\u00fcy\u00fck harfleri birbirinin yerine kullanmak, say\u0131lar ve \u00f6zel karakterler kullanmak sadece bir ba\u015flang\u0131\u00e7t\u0131r. Bu noktada bir parola y\u00f6neticisi de size b\u00fcy\u00fck \u00f6l\u00e7\u00fcde yard\u0131mc\u0131 olabilir.<\/li><li>Google&#8217;\u0131n kimlik do\u011frulay\u0131c\u0131s\u0131 gibi iki fakt\u00f6rl\u00fc kimlik do\u011frulama olan 2FA&#8217;y\u0131 kullanmak, otomatik sald\u0131r\u0131lar\u0131 neredeyse tamamen \u00f6nleyebilir.<\/li><li><strong>Bilinmeyen kaynaklardan gelen e-posta eklerini a\u00e7may\u0131n<\/strong> &#8211; Bu, kimlik av\u0131 sald\u0131r\u0131s\u0131 i\u00e7in yayg\u0131n bir taktiktir, bu nedenle g\u00f6nderenin kim oldu\u011funu dikkatlice kontrol edin ve me\u015fru olduklar\u0131ndan emin olun.<\/li><li><strong>Pop-up reklamlara t\u0131klamaktan ka\u00e7\u0131n\u0131n<\/strong> &#8211; Reklam yaz\u0131l\u0131m\u0131 ciddi bir tehdittir ve hafife al\u0131nmamal\u0131d\u0131r.<\/li><li><strong>Garip ba\u011flant\u0131lara t\u0131klamaktan ka\u00e7\u0131n\u0131n<\/strong> &#8211; Bilinen bir kaynaktan bir mesaj alsan\u0131z bile, bu mesaj, etkisini yaymak isteyen k\u00f6t\u00fc niyetli bir taraftan gelebilir.<\/li><li><strong>Uygulamalar\u0131n\u0131z\u0131 ve i\u015fletim sisteminizi g\u00fcncel tutun <\/strong>&#8211; G\u00fcncellemeler genellikle istismar edilebilecek g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 yamalar.<\/li><li><strong>Resmi ma\u011fazalardan veya web sitelerinden uygulama indirin<\/strong> &#8211; E\u011fer bu \u00f6nlemi almazsan\u0131z, cihaz\u0131n\u0131za vir\u00fcs bula\u015ft\u0131rabilir.<\/li><li><strong>Yedekleri saklay\u0131n<\/strong> &#8211; Bulutta yedekleme yapmak, verilerinizi cihazlar\u0131n\u0131zda meydana gelen herhangi bir enfeksiyondan izole eder.<\/li><li><strong>Siber g\u00fcvenlik yaz\u0131l\u0131m\u0131n\u0131 indirin<\/strong> &#8211; Modern bir internet kullan\u0131c\u0131s\u0131n\u0131n bu t\u00fcr programlar\u0131 kullanmas\u0131 gerekir.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mac&#8217;ler ve Telefonlar K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlardan Etkilenebilir Mi?<\/h2>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fan tek cihaz PC&#8217;ler de\u011fildir; telefonlara ve Mac&#8217;lere de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fabilir. Yani Mac&#8217;iniz, cep telefonunuz veya tabletiniz de dahil olmak \u00fczere internete ba\u011fl\u0131 herhangi bir cihaz risk alt\u0131ndad\u0131r.<\/p>\n\n\n\n<p>Apple, s\u0131f\u0131r\u0131nc\u0131 g\u00fcn sald\u0131r\u0131lar\u0131na kar\u015f\u0131 macOS&#8217;e h\u0131zl\u0131 bir \u015fekilde yama uygularken, Mac&#8217;ler son y\u0131llarda artan say\u0131da k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tehdidiyle kar\u015f\u0131 kar\u015f\u0131ya kalm\u0131\u015ft\u0131r. Bu noktada bir Mac k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m temizleme arac\u0131, Mac&#8217;inizi vir\u00fcslerden uzak tutman\u0131za yard\u0131mc\u0131 olabilir.<\/p>\n\n\n\n<p>Bu arada, Android ve iOS k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ortaya \u00e7\u0131kmaya devam etmektedir. Android casus yaz\u0131l\u0131mlar\u0131ndan Android fidye yaz\u0131l\u0131mlar\u0131na kadar cihaz\u0131n\u0131za y\u00f6nelik pek \u00e7ok tehdit vard\u0131r ve herhangi bir iPhone vir\u00fcs\u00fc olmasa da, \u00f6zellikle telefonunuzu jailbreak yapt\u0131ysan\u0131z, iOS tamamen tehdide dayan\u0131kl\u0131 de\u011fildir. Ancak casus yaz\u0131l\u0131m gibi sinsi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar bile do\u011fru ad\u0131mlar ve ara\u00e7larla iPhone&#8217;unuzdan kald\u0131r\u0131labilir.<\/p>\n\n\n\n<p>\u00d6zetle diyebiliriz ki, bilgisayar vir\u00fcsleri ve di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 dosyalarla ba\u015fa \u00e7\u0131kmak i\u00e7in g\u00fcvenlik yaz\u0131l\u0131m\u0131na sahip olmak, modern bir internet kullan\u0131c\u0131s\u0131 i\u00e7in olduk\u00e7a gereklidir. Vir\u00fcs bula\u015fm\u0131\u015f bir bilgisayar veya mobil cihaz kullanmak mali kay\u0131plar, g\u00fcvenli\u011fi ihlal edilmi\u015f hesaplar ve kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 gibi potansiyel olarak b\u00fcy\u00fck sorunlara yol a\u00e7abilir.<\/p>\n\n\n\n<p>Bu nedenle hem bireyler hem de i\u015fletmeler i\u00e7in tehditleri tarayan yaz\u0131l\u0131mlar kullanmak ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 korumay\u0131 etkin bir \u015fekilde uygulamak hayati \u00f6nem ta\u015f\u0131r. Ayr\u0131ca, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n \u00e7o\u011fu bula\u015fmay\u0131 yaymak i\u00e7in insan fakt\u00f6r\u00fcne ba\u011fl\u0131 oldu\u011fundan, farkl\u0131 tehdit t\u00fcrleri hakk\u0131nda bilgi sahibi olman\u0131z da \u00f6nemlidir.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erikler:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\">Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/viruslu-e-mail-guvenligi\/\">Vir\u00fcsl\u00fc E-Mailler Hakk\u0131nda Al\u0131nacak \u00d6nlemler ve E-Posta G\u00fcvenli\u011fi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/e-posta-sunucu-destekli-antivirus-programlari\/\">E-posta Sunucu Destekli Antivir\u00fcs Programlar\u0131<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/penetrasyon-sizma-testi\/\">Penetrasyon (S\u0131zma) Testi Nedir, A\u015famalar\u0131 Nelerdir? Firmalar G\u00fcvenlik A\u00e7\u0131klar\u0131n\u0131 Nas\u0131l Giderebilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/credential-stuffing\/\">Credential Stuffing Nedir? Kimlik Bilgisi Doldurma Sald\u0131r\u0131s\u0131 Nas\u0131l \u00d6nlenir? E-ticaret Sitelerinin Verileri \u0130\u00e7in B\u00fcy\u00fck Tehlike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spoofing\/\">Spoofing Nedir? \u015eirketler \u0130\u00e7in Spoofing Tehditleri: IP Spoofing Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Korunma Stratejileri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/botnet\/\">Botnet Nedir? \u0130\u015fletmeler Verilerinin G\u00fcvenli\u011fini Nas\u0131l Sa\u011flamal\u0131? Botnet Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunmal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-transfer-agent-mta\/\">Mail Transfer Agent (MTA) Nedir? \u0130\u015fletmeler Online Ortamda E-Posta Hesaplar\u0131n\u0131 Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/dlp-data-loss-prevention\/\">DLP (Data Loss Prevention) Nedir? Kurumlar \u0130\u00e7in \u0130nternet Ortam\u0131nda Tehditleri \u0130zleme ve Verileri G\u00fcvende Tutma Rehberi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/firewall-nedir\/\">Firewall Nedir, Ne \u0130\u015fe Yarar? Firewall T\u00fcrleri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing Nedir? Phishing (Oltalama) Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\">Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Her internet kullan\u0131c\u0131s\u0131, veri ve donan\u0131mlar\u0131n\u0131 tehlikeye atabilecek potansiyel \u00e7evrimi\u00e7i tehditlerin fark\u0131nda olmal\u0131d\u0131r. Fark\u0131nda olmas\u0131 gereken en \u00f6nemli \u015feylerden biri de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Peki malware tam olarak nedir? Malware Nedir?&nbsp; Malware yani k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, herhangi bir programlanabilir cihaza, sunucuya veya a\u011fa zarar vermek veya bunlardan yararlanmak i\u00e7in tasarlanm\u0131\u015f bilgisayarl\u0131 koddur. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3209,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86,1],"tags":[],"class_list":["post-3193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/malware\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Her internet kullan\u0131c\u0131s\u0131, veri ve donan\u0131mlar\u0131n\u0131 tehlikeye atabilecek potansiyel \u00e7evrimi\u00e7i tehditlerin fark\u0131nda olmal\u0131d\u0131r. Fark\u0131nda olmas\u0131 gereken en \u00f6nemli \u015feylerden biri de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Peki malware tam olarak nedir? Malware Nedir?&nbsp; Malware yani k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, herhangi bir programlanabilir cihaza, sunucuya veya a\u011fa zarar vermek veya bunlardan yararlanmak i\u00e7in tasarlanm\u0131\u015f bilgisayarl\u0131 koddur. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T21:01:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-18T18:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/malware\/","og_locale":"tr_TR","og_type":"article","og_title":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir? - Uzman Posta","og_description":"Her internet kullan\u0131c\u0131s\u0131, veri ve donan\u0131mlar\u0131n\u0131 tehlikeye atabilecek potansiyel \u00e7evrimi\u00e7i tehditlerin fark\u0131nda olmal\u0131d\u0131r. Fark\u0131nda olmas\u0131 gereken en \u00f6nemli \u015feylerden biri de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Peki malware tam olarak nedir? Malware Nedir?&nbsp; Malware yani k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, herhangi bir programlanabilir cihaza, sunucuya veya a\u011fa zarar vermek veya bunlardan yararlanmak i\u00e7in tasarlanm\u0131\u015f bilgisayarl\u0131 koddur. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/malware\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-04-14T21:01:29+00:00","article_modified_time":"2023-05-18T18:00:55+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/malware\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?","datePublished":"2023-04-14T21:01:29+00:00","dateModified":"2023-05-18T18:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/"},"wordCount":2732,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg","articleSection":["G\u00fcvenlik","Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/malware\/","url":"https:\/\/uzmanposta.com\/blog\/malware\/","name":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg","datePublished":"2023-04-14T21:01:29+00:00","dateModified":"2023-05-18T18:00:55+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/malware\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/malware\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/malware\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/04\/malware-nedir-nasil-temizlenir-nasil-bulasir-isletmeler-eposta-guvenligi-hususunda-malware-saldirisindan-nasil-korunabilir.jpeg","width":1000,"height":500,"caption":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3193"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3209"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}