{"id":3840,"date":"2023-11-23T17:18:16","date_gmt":"2023-11-23T14:18:16","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3840"},"modified":"2023-11-23T17:18:18","modified_gmt":"2023-11-23T14:18:18","slug":"vishing-voice-phishing","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/","title":{"rendered":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r?"},"content":{"rendered":"\n<p>Son zamanlardaki siber sald\u0131r\u0131 t\u00fcrlerinden biri de vishing sald\u0131r\u0131s\u0131d\u0131r. IBM&#8217;in X-Force taraf\u0131ndan yay\u0131nlanan bir rapora g\u00f6re, vishing sald\u0131r\u0131lar\u0131 son birka\u00e7 y\u0131lda h\u0131zla artm\u0131\u015ft\u0131r. Sadece 2022 y\u0131l\u0131nda, bu siber sald\u0131r\u0131lar \u015fu ana kadar t\u00fcm siber doland\u0131r\u0131c\u0131l\u0131klar\u0131n %41&#8217;ini olu\u015fturmaktad\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vishing (Voice phishing) Nedir?<\/h2>\n\n\n\n<p>Sesli oltalama olarak da bilinen vishing, bilgisayar korsanlar\u0131n\u0131n hedeflenen ki\u015fileri ba\u015fka biriymi\u015f gibi davranarak telefonla arad\u0131klar\u0131 bir sosyal m\u00fchendislik t\u00fcr\u00fcd\u00fcr. Bu sald\u0131r\u0131 t\u00fcr\u00fcnde telefondaki ki\u015fi teknik destek, banka \u00e7al\u0131\u015fan\u0131 veya hatta polis memuru oldu\u011funu iddia edebilir. Ger\u00e7ekte bu ki\u015filer sizi doland\u0131rmak isteyen ki\u015filerdir ve istedikleri tek \u015fey ki\u015fisel bilgilerinizdir. E\u011fer ba\u015far\u0131l\u0131 olurlarsa, bir sonraki ad\u0131m ya kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 ya da banka hesaplar\u0131n\u0131z\u0131 bo\u015faltmak olacakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vishing sald\u0131r\u0131lar\u0131n\u0131n temel amac\u0131 nedir?<\/h3>\n\n\n\n<p>Siber su\u00e7lular de\u011ferli ki\u015fisel verileri \u00e7almak i\u00e7in vishing y\u00f6ntemini kullan\u0131r. Bu bilgiler ki\u015fisel kimlik bilgileri, banka hesap numaralar\u0131, giri\u015f bilgileri, gizli parolalar veya \u015firket kimlik bilgileri olabilir. Vishing giri\u015fimi ba\u015far\u0131l\u0131 olursa, su\u00e7lu bilgilerinizi ki\u015fisel bilgilerinize veya di\u011fer de\u011ferli varl\u0131klara eri\u015fmek i\u00e7in kullanabilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vishing Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir.jpeg\" alt=\"Vishing Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00c7al\u0131\u015f\u0131r?\" class=\"wp-image-3889\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-saldirilari-nasil-calisir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Vishing sald\u0131r\u0131lar\u0131, genellikle bilgisayar korsan\u0131n\u0131n hedefleri hakk\u0131nda sosyal m\u00fchendislik taktiklerinde kullan\u0131labilecek ki\u015fisel bilgileri \u00f6\u011frenmek i\u00e7in ara\u015ft\u0131rma yapmas\u0131yla ba\u015flar. Bilgisayar korsanlar\u0131 genellikle hedeflerin telefon numaralar\u0131yla yan\u0131t vermelerini sa\u011flamaya \u00e7al\u0131\u015fan e-posta\u2019lar g\u00f6ndererek i\u015fe ba\u015flar. Daha sonra hedefi arayarak korku gibi insani i\u00e7g\u00fcd\u00fclerle oynarlar, hatta hassas bilgileri if\u015fa etmeye ikna etmek i\u00e7in bir arkada\u015f veya aile \u00fcyesi gibi davranmak \u00fczere ses de\u011fi\u015ftirme yaz\u0131l\u0131m\u0131 kullanabilirler. Ba\u015far\u0131l\u0131 olmalar\u0131 halinde, bilgisayar korsanlar\u0131 banka hesaplar\u0131na yetkisiz eri\u015fim elde edebilir ve hileli transfer i\u015flemleri ger\u00e7ekle\u015ftirebilir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vishing T\u00fcrleri<\/h2>\n\n\n\n<p>T\u0131pk\u0131 normal oltalama gibi birka\u00e7 farkl\u0131 vishing sald\u0131r\u0131s\u0131 t\u00fcr\u00fc de vard\u0131r. Bunlar a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Deepfakes<\/h3>\n\n\n\n<p>Geli\u015fmi\u015f yapay zeka, tan\u0131d\u0131\u011f\u0131n\u0131z ki\u015fileri taklit ederek doland\u0131r\u0131c\u0131lar\u0131n ba\u015far\u0131l\u0131 olmas\u0131na yard\u0131mc\u0131 olur. \u0130nand\u0131r\u0131c\u0131 bir ses klonu yaratmak i\u00e7in ihtiya\u00e7 duyduklar\u0131 tek \u015fey, genellikle sosyal medya platformlar\u0131nda herkese a\u00e7\u0131k olan k\u0131sa bir ses \u00f6rne\u011fidir.<\/p>\n\n\n\n<p>Su\u00e7lu aramay\u0131 ba\u015flatt\u0131ktan sonra, sesi do\u011fal bir \u015fekilde &#8220;konu\u015fmaya&#8221; y\u00f6nlendirmek i\u00e7in metinden sese yaz\u0131l\u0131m\u0131 kullan\u0131r. Arayan ki\u015finin i\u015f arkada\u015f\u0131n\u0131z, m\u00fcd\u00fcr\u00fcn\u00fcz veya \u015firket CEO&#8217;nuz oldu\u011funu d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fczde, arayan ki\u015finin hassas bilgi talebini yerine getirme olas\u0131l\u0131\u011f\u0131n\u0131z daha y\u00fcksektir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Robocall<\/h3>\n\n\n\n<p>Numaralar\u0131 aramak ve \u00f6nceden kaydedilmi\u015f mesajlar\u0131 \u00e7al\u0131\u015ft\u0131rmak i\u00e7in \u00f6zel bir yaz\u0131l\u0131m kullanan bu vishing doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 yayg\u0131nd\u0131r. Otomatik mesaj, bankan\u0131z, h\u00fck\u00fcmet, polis gibi s\u00f6zde bir makamdan geldi\u011fini iddia eder.<\/p>\n\n\n\n<p>Kay\u0131t sizi hesap bilgilerinizi teyit etmeye veya ad\u0131n\u0131z\u0131, kredi kart\u0131 bilgilerinizi, banka hesap bilgilerinizi ve posta adresinizi vererek hesab\u0131n\u0131z\u0131 g\u00fcvence alt\u0131na almaya \u00e7a\u011f\u0131r\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Teknik Destek \u00c7a\u011fr\u0131s\u0131<\/h3>\n\n\n\n<p>Arayanlar \u015firketinizin BT departman\u0131ndan, internet servis sa\u011flay\u0131c\u0131n\u0131zdan veya di\u011fer teknik destek hizmetlerinden olduklar\u0131n\u0131 iddia eder. Cihaz\u0131n\u0131z\u0131n veya ba\u011flant\u0131n\u0131z\u0131n g\u00fcvenli olmad\u0131\u011f\u0131n\u0131 ve sorunu \u00e7\u00f6zmek i\u00e7in \u015fifrenize veya uzaktan eri\u015fiminize ihtiya\u00e7lar\u0131 oldu\u011funu s\u00f6ylerler.<\/p>\n\n\n\n<p>B\u00fcy\u00fck \u015firketlerde, BT&#8217;de kimin \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 \u015fahsen bilmiyor olabilirsiniz. \u0130\u015f arkada\u015f\u0131n\u0131z\u0131n sadece i\u015fini yapt\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcnerek bilgilerinizi vermek zorunda hissedebilirsiniz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. M\u00fc\u015fteri \u00c7a\u011fr\u0131s\u0131<\/h3>\n\n\n\n<p>Bu vishing doland\u0131r\u0131c\u0131l\u0131\u011f\u0131nda, arayanlar \u00e7\u00f6p dal\u0131\u015f\u0131 (dumpster diving) yoluyla bulduklar\u0131 eski faturalar\u0131 kullanarak para s\u0131zd\u0131rmaya \u00e7al\u0131\u015f\u0131r. Arama s\u0131ras\u0131nda sat\u0131c\u0131 gibi davran\u0131rlar ve faturan\u0131n \u00f6denmemi\u015f oldu\u011funu s\u00f6ylerler. Paray\u0131 g\u00f6ndermek i\u00e7in h\u0131zl\u0131 hareket etmeniz konusunda sizi bask\u0131 alt\u0131na almak i\u00e7in acil veya \u00f6fkeli bir ton benimserler.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. VoIP Vishing<\/h3>\n\n\n\n<p>\u0130nternet Protokol\u00fc \u00dczerinden Ses (VoIP), vishing doland\u0131r\u0131c\u0131lar\u0131n\u0131n tespit edilmekten ka\u00e7\u0131nmas\u0131n\u0131 kolayla\u015ft\u0131r\u0131r. VoIP aramalar\u0131, izlenmesi zor olan sanal numaralardan yap\u0131l\u0131r. Bilgisayar korsan\u0131, su\u00e7u i\u015flemek i\u00e7in kula\u011fa me\u015fru gelen yerel ofislerden veya kurumlardan geliyormu\u015f gibi g\u00f6r\u00fcnen sahte numaralar olu\u015fturabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Arayan Kimli\u011fi Sahtecili\u011fi<\/h3>\n\n\n\n<p>VoIP vishing gibi siber su\u00e7lular kendilerini &#8220;bilinmeyen&#8221; olarak listeleyerek veya devlet dairesi, hastane, polis veya kamu hizmeti \u015firketi gibi yasal bir kurulu\u015fun numaras\u0131n\u0131 ve ad\u0131n\u0131 taklit ederek sizi kand\u0131r\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. \u00c7\u00f6p Dal\u0131\u015f\u0131 (Dumpster Diving)&nbsp;<\/h3>\n\n\n\n<p>Dijital \u00e7a\u011fda bile ofisler hala ka\u011f\u0131t kullan\u0131r ve vishing doland\u0131r\u0131c\u0131lar\u0131 da bunu bilir. Bu sayede ofis binalar\u0131n\u0131n ve parklar\u0131n arkas\u0131ndaki \u00e7\u00f6p kutular\u0131n\u0131 kar\u0131\u015ft\u0131rarak ge\u00e7erli \u00e7al\u0131\u015fan ve i\u015f telefon numaralar\u0131n\u0131 kolayca toplayabilirler. Genellikle hedefli bir vishing sald\u0131r\u0131s\u0131nda kullanmak i\u00e7in destekleyici ayr\u0131nt\u0131lar bulurlar.<\/p>\n\n\n\n<p>Sosyal m\u00fchendislik, bu vishing tekniklerinin ba\u015far\u0131s\u0131 i\u00e7in kritik \u00f6neme sahiptir. Bu y\u00fczden acil, zorlay\u0131c\u0131 veya a\u015f\u0131r\u0131 ikna edici bir dil kullanan arayanlara her zaman \u015f\u00fcpheyle yakla\u015fman\u0131z gerekir. Teknik destek, bankalar, kamu kurulu\u015flar\u0131 ve hastanelerin asla ki\u015fisel banka bilgilerinizi istemeyece\u011fini bilmeniz gerekir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bir Vishing Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 Nas\u0131l Tespit Edilir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir.jpeg\" alt=\"Bir Vishing Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 Nas\u0131l Tespit Edilir?\" class=\"wp-image-3892\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/bir-vishing-dolandiriciligi-nasil-tespit-edilir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Belirli ipu\u00e7lar\u0131na dikkat ederek bir vishing doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131 tespit edebilir ve k\u00f6t\u00fc bir \u015fey olmadan \u00f6nce durdurabilirsiniz. A\u015fa\u011f\u0131daki listede bir vishing doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131 nas\u0131l tespit edilece\u011fine dair listeye g\u00f6z atarak bu doland\u0131r\u0131c\u0131l\u0131ktan ka\u00e7\u0131nabilirsiniz:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Gizli bilgileri if\u015fa etmeniz istenir<\/h3>\n\n\n\n<p>Finansal bilgileriniz, adresiniz, do\u011fum tarihiniz, sosyal g\u00fcvenlik numaran\u0131z, oturum a\u00e7ma bilgileriniz veya di\u011fer ki\u015fisel bilgilerinizi, g\u00fcvenmedi\u011finiz ki\u015filerle payla\u015fmay\u0131n. Bir vishing aramas\u0131n\u0131 cevaplamak kendi ba\u015f\u0131na tehlikeli de\u011fildir. Ancak, kendiniz hakk\u0131nda bilgi verdi\u011finizde veya arayan\u0131n iste\u011fi \u00fczerine bir \u015fey yapt\u0131\u011f\u0131n\u0131zda i\u015fler ters gidebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Arayan ki\u015finin talebi \u015f\u00fcpheli derecede acildir<\/h3>\n\n\n\n<p>De\u011ferli bilgileri if\u015fa etmenizi sa\u011flamak i\u00e7in doland\u0131r\u0131c\u0131n\u0131n talebinde genellikle bir aciliyet duygusu vard\u0131r. Bu \u015fekilde, d\u00fc\u015f\u00fcnmek i\u00e7in yeterli zaman\u0131n\u0131z olmadan ve arayan ki\u015finin iyi bir \u015fey yapmayabilece\u011fini fark etmeden h\u0131zl\u0131 hareket etmeniz sa\u011flan\u0131r. Bu noktada arayan ki\u015finin talebinin makul g\u00f6r\u00fcn\u00fcp g\u00f6r\u00fcnmedi\u011fini her zaman durup d\u00fc\u015f\u00fcnmeniz gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Arayan ki\u015fi size g\u00fcvenilir biri oldu\u011funu s\u00f6yl\u00fcyorsa<\/h3>\n\n\n\n<p>Bu elbette otomatik olarak arayan\u0131n doland\u0131r\u0131c\u0131 oldu\u011fu anlam\u0131na gelmez. G\u00fcvenilir ki\u015filer de asl\u0131nda zaman zaman telefonla size ula\u015fabilir. Ancak, telefonda arayan ki\u015finin ger\u00e7ek kimli\u011finden emin de\u011filseniz, bu nedenle dikkatli olman\u0131z gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Arama k\u0131sa s\u00fcrer ve aniden biter<\/h3>\n\n\n\n<p>Bazen bilgisayar korsan\u0131, siz bir \u015fey duyamadan biten k\u0131sa aramalar yaparak geri araman\u0131z\u0131 sa\u011flamaya \u00e7al\u0131\u015fabilir. Ama\u00e7lar\u0131 sizin geri araman\u0131z\u0131 sa\u011flamakt\u0131r. Hedeflenen ki\u015fi haberi olmad\u0131\u011f\u0131 i\u00e7in arama bekledi\u011finden daha pahal\u0131ya mal olabilir.<\/p>\n\n\n\n<p>E\u011fer ger\u00e7ekten bir vishing sald\u0131r\u0131s\u0131n\u0131n hedefi olabilece\u011finizi d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, yap\u0131lacak en iyi \u015fey aramay\u0131 hemen sonland\u0131rmakt\u0131r. Kendinizi bir vishing sald\u0131r\u0131s\u0131n\u0131n hedefi olmaktan koruman\u0131n di\u011fer yollar\u0131 ise, sessiz kalmak ya da arayan ki\u015finin sorular\u0131na yaln\u0131zca daha fazla soruyla yan\u0131t vermektir.<\/p>\n\n\n\n<p>\u015e\u00fcpheli bir numara arad\u0131\u011f\u0131nda ilk etapta telefonu a\u00e7mayarak da kendinizi koruyabilirsiniz. Sizinle ger\u00e7ekten ileti\u015fime ge\u00e7meleri gerekiyorsa, tekrar arayacaklar veya size bir mesaj g\u00f6ndereceklerdir. Geri araman\u0131z\u0131 sa\u011flamak bir tuzak olabilir. Kimin arad\u0131\u011f\u0131n\u0131 bilmeniz gerekiyorsa, daha fazla bilgi i\u00e7in numaray\u0131 Google&#8217;da aramay\u0131 deneyebilirsiniz. Telefon numaralar\u0131na g\u00f6re sizi kimin arad\u0131\u011f\u0131n\u0131 bulmak i\u00e7in kullan\u0131labilecek uygulamalar da vard\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vishing, Phishing ve Smishing Sald\u0131r\u0131lar\u0131 Aras\u0131ndaki Farklar<\/h2>\n\n\n\n<p>Her \u00fc\u00e7 sald\u0131r\u0131n\u0131n da hedefinin ayn\u0131d\u0131r: finansal kazan\u00e7 i\u00e7in kullan\u0131c\u0131lardan hassas bilgiler elde etmek. Ancak, farkl\u0131l\u0131klar\u0131 kullan\u0131lan ortamda yatmaktad\u0131r. Vishing sald\u0131r\u0131lar\u0131 telefon \u00fczerinden ger\u00e7ekle\u015fir. \u00d6te yandan, <a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">oltalama sald\u0131r\u0131lar\u0131<\/a> e-posta\u2019lar arac\u0131l\u0131\u011f\u0131yla ger\u00e7ekle\u015firken, <a href=\"https:\/\/uzmanposta.com\/blog\/smishing\/\">smishing sald\u0131r\u0131lar\u0131<\/a> ise SMS mesajlar\u0131 arac\u0131l\u0131\u011f\u0131yla ger\u00e7ekle\u015fir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Yayg\u0131n Vishing Sald\u0131r\u0131s\u0131 \u00d6rnekleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri.jpeg\" alt=\"Yayg\u0131n Vishing Sald\u0131r\u0131s\u0131 \u00d6rnekleri\" class=\"wp-image-3891\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/yaygin-vishing-saldirisi-ornekleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Vishing sald\u0131r\u0131lar\u0131 sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131d\u0131r. Yani bir bilgisayar korsan\u0131 bir hedefi rastgele aramaz. Bunun yerine, hedefledikleri ki\u015fi hakk\u0131nda daha fazla bilgi edinmek i\u00e7in stratejik bir yakla\u015f\u0131m kullan\u0131rlar. Temel olarak, hedef ki\u015finin sosyal medya profillerini inceler ve onlar i\u00e7in &#8220;\u00f6zel&#8221; bir strateji geli\u015ftirirler.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Devlet Do\u011frulamas\u0131<\/h3>\n\n\n\n<p>Hedeflenen ki\u015fi sosyal g\u00fcvenlik veya di\u011fer yard\u0131mlar\u0131 al\u0131yorsa, bilgisayar korsan\u0131 bu bilgileri almak i\u00e7in kendini bir h\u00fck\u00fcmet temsilcisi olarak gizleyebilir. Bilgisayar korsan\u0131, ma\u011fdurun bu yard\u0131mlar\u0131 almaya devam edebilmesi i\u00e7in do\u011frulama amac\u0131yla bu bilgilere ihtiya\u00e7 duyduklar\u0131n\u0131 &#8220;iddia edebilir&#8221;.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u00c7evrimi\u00e7i \u00d6deme Ge\u00e7idi<\/h3>\n\n\n\n<p>Bazen bir siber sald\u0131rgan Google, Apple veya Amazon gibi \u015firketlerin m\u00fc\u015fteri destek temsilcisi oldu\u011funu iddia edebilir. Hedeflenen ki\u015finin dijital c\u00fczdanlar\u0131nda ola\u011fand\u0131\u015f\u0131 bir hareketlilik fark ettiklerini ya da kontrol ettiklerini s\u00f6ylerler. &#8220;Temsilci&#8221; daha sonra bu c\u00fczdanlara eri\u015fmek i\u00e7in \u015fifreler ve PIN ister.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Banka M\u00fcd\u00fcr\u00fc<\/h3>\n\n\n\n<p>Bu muhtemelen bu listedeki en yayg\u0131n siber sald\u0131r\u0131 t\u00fcr\u00fcd\u00fcr. Burada bilgisayar korsan\u0131, kendini bir banka m\u00fcd\u00fcr\u00fc olarak tan\u0131t\u0131r ve hedeflenen ki\u015finin hesab\u0131nda baz\u0131 hileli i\u015flemler oldu\u011funu iddia eder. Bilgisayar korsan\u0131 ayr\u0131ca bankan\u0131n bir \u00e7ek ald\u0131\u011f\u0131n\u0131 ve bunu hedeflenen ki\u015finin hesab\u0131na yat\u0131rmak istedi\u011fini de iddia edebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Teknik Destek<\/h3>\n\n\n\n<p>Bu \u00f6rnekte, siber su\u00e7lular Microsoft gibi \u015firketlerin teknik destek temsilcileri olduklar\u0131n\u0131 iddia eder. Hedeflenen ki\u015finin cihaz\u0131nda bulunan vir\u00fcsler hakk\u0131nda derinlemesine konu\u015furlar. Ard\u0131ndan, hedeflenen ki\u015fiden e-posta yoluyla g\u00f6nderecekleri belirli bir antivir\u00fcs yaz\u0131l\u0131m\u0131n\u0131 y\u00fcklemesini isterler. G\u00f6nderdikleri ba\u011flant\u0131, hedeflenen ki\u015finin cihaz\u0131na bula\u015fabilecek k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar veya di\u011fer zararl\u0131 vir\u00fcsler i\u00e7erir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bireysel Olarak Vishing Sald\u0131r\u0131lar\u0131n\u0131 \u00d6nlemek i\u00e7in 3 \u0130pucu<\/h2>\n\n\n\n<p>Potansiyel bir kurban olmaktan ka\u00e7\u0131nmak i\u00e7in uygulayabilece\u011finiz baz\u0131 ipu\u00e7lar\u0131 ve p\u00fcf noktalar a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Konu\u015fmalar\u0131n\u0131z\u0131n Fark\u0131nda Olun<\/h3>\n\n\n\n<p>\u015e\u00fcpheli bir ki\u015fi sizi ararsa her zaman fark\u0131ndal\u0131\u011f\u0131n\u0131z\u0131 koruyun. Bilgisayar korsanlar\u0131n\u0131n telefonda neredeyse herkes gibi davranabilece\u011fini unutmay\u0131n. Aramaya devam etmeden \u00f6nce her zaman ilgili kurulu\u015fla iki kez kontrol edin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Hassas Bilgileri A\u00e7\u0131klamaktan Ka\u00e7\u0131n\u0131n<\/h3>\n\n\n\n<p>Telefonda kendinizle ilgili herhangi bir bilgiyi a\u00e7\u0131klamaktan ka\u00e7\u0131n\u0131n. Bu ipucu sadece banka hesap bilgileriniz ve PIN kodlar\u0131n\u0131zla ilgili de\u011fildir. Asl\u0131nda, telefonda herhangi bir bilgi t\u00fcr\u00fcn\u00fc a\u00e7\u0131klamamal\u0131s\u0131n\u0131z. Buna ev adresiniz ve kendinizle ilgili di\u011fer ki\u015fisel bilgiler de dahildir. Hi\u00e7bir yasal kurulu\u015fun telefonla aray\u0131p ki\u015fisel bilgilerinizi istemeyece\u011fini unutmay\u0131n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Yaln\u0131zca G\u00fcvenilir Arayanlardan Gelen \u00c7a\u011fr\u0131lar\u0131 Kabul Edin<\/h3>\n\n\n\n<p>\u015e\u00fcpheli numaralardan gelen aramalar\u0131 yan\u0131tlamaktan ka\u00e7\u0131n\u0131n. Bunun yerine, arayanlar\u0131n sesli mesaj b\u0131rakmas\u0131na izin verin. Konuyla ilgili oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z daha sonra yan\u0131t verebilirsiniz. Siber sald\u0131rganlar asla sesli mesaj b\u0131rakmazlar. \u0130stenmeyen numaralardan arama almamak i\u00e7in telefon numaran\u0131z\u0131 Aramay\u0131n kay\u0131t defterine bile kaydedebilirsiniz.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ki\u015fisel bilgilerinizi, i\u015f yerinizi veya ev adresinizi telefonda vermeyin veya teyit etmeyin.<\/li><li>Bilinmeyen numaralardan gelen telefonlara cevap vermeyin. Aramay\u0131 sesli mesaja b\u0131rak\u0131n ve yan\u0131t vermeden \u00f6nce mesaj\u0131n me\u015fruiyetini de\u011ferlendirin.<\/li><li>Anormallikleri veya garip arka plan g\u00fcr\u00fclt\u00fcs\u00fcn\u00fc tespit etmek i\u00e7in arayan\u0131n sesini dikkatlice dinleyin.<\/li><li>Taleplere yan\u0131t vermeden \u00f6nce duraklay\u0131n-\u00f6zellikle de talepler acilse. Arayan ki\u015fi h\u0131zl\u0131 hareket etme sorumlulu\u011funuzu istismar ediyor olabilir.<\/li><li>Sorular sorun. Arayan ki\u015fi bilgi talep ediyor veya bir \u00f6d\u00fcl teklif ediyorsa, kim olduklar\u0131n\u0131 do\u011frulamak i\u00e7in adlar\u0131na ve \u015firket telefon numaralar\u0131na ihtiyac\u0131n\u0131z oldu\u011funu s\u00f6yleyin. Bu bilgileri vermeyi reddederlerse telefonu kapat\u0131n. Verirlerse, kar\u015f\u0131l\u0131\u011f\u0131nda bilgilerinizi vermeden \u00f6nce yasal oldu\u011fundan emin olun.<\/li><li>Hassas bilgiler i\u00e7eren i\u015f aramalar\u0131 i\u00e7in bir kimlik do\u011frulama s\u00fcreci uygulay\u0131n. Arayan ki\u015fi bir i\u015f arkada\u015f\u0131n\u0131z\u0131 taklit ediyor ancak bir g\u00fcvenlik sorusuna yan\u0131t veremiyorsa, bu bir vishing giri\u015fimi olabilir.<\/li><li>Telefon numaran\u0131z\u0131 isteyen e-posta\u2019lara veya sosyal medya mesajlar\u0131na yan\u0131t vermeyin. Bu taktik genellikle hedefli bir vishing sald\u0131r\u0131s\u0131n\u0131n ilk ad\u0131m\u0131d\u0131r. Bunun yerine, bu e-posta\u2019lar\u0131 ve mesajlar\u0131 BT ekibinize bildirin.<\/li><li>Telefonunuzda spam aramalar\u0131 engelleyen veya filtreleyen koruma \u00f6zelliklerini ke\u015ffedin ve etkinle\u015ftirin.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\u0130\u015fletmelerin Vishing Sald\u0131r\u0131lar\u0131n\u0131 \u00d6nlemesi \u0130\u00e7in \u0130pu\u00e7lar\u0131<\/h2>\n\n\n\n<p>Vishing sald\u0131r\u0131lar\u0131 s\u00f6z konusu oldu\u011funda, siber su\u00e7lular i\u015fletmeleri&nbsp;de hedef alabilir. A\u015fa\u011f\u0131da bu sald\u0131r\u0131lar\u0131n kurumunuzda ger\u00e7ekle\u015fmesini \u00f6nlemenin baz\u0131 yollar\u0131n\u0131 bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. \u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 E\u011fitin<\/h3>\n\n\n\n<p>\u0130lk ad\u0131m olarak, \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 vishing sald\u0131r\u0131lar\u0131 konusunda e\u011fitin. Onlara siber su\u00e7lular\u0131n hassas bilgileri elde etmek i\u00e7in bu sald\u0131r\u0131lar\u0131 nas\u0131l kullanabilece\u011fini g\u00f6sterin. Ayr\u0131ca, hi\u00e7bir y\u00f6neticinin veya CEO&#8217;nun bilgi istemek i\u00e7in onlarla telefonda ileti\u015fime ge\u00e7meyece\u011fini de \u00e7al\u0131\u015fanlar\u0131n\u0131za hat\u0131rlatmal\u0131s\u0131n\u0131z.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Hassas Bilgilere Eri\u015fimi S\u0131n\u0131rland\u0131r\u0131n<\/h3>\n\n\n\n<p>Genel olarak, i\u015fletmenizdeki hassas belgelere eri\u015fimi d\u00fczene sokmak ve k\u0131s\u0131tlamak iyi bir uygulamad\u0131r. Bu belgeler, \u00e7al\u0131\u015fan bilgilerini ve di\u011fer i\u015f a\u00e7\u0131s\u0131ndan kritik bilgileri i\u00e7eren her \u015feyi i\u00e7erebilir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Son zamanlardaki siber sald\u0131r\u0131 t\u00fcrlerinden biri de vishing sald\u0131r\u0131s\u0131d\u0131r. IBM&#8217;in X-Force taraf\u0131ndan yay\u0131nlanan bir rapora g\u00f6re, vishing sald\u0131r\u0131lar\u0131 son birka\u00e7 y\u0131lda h\u0131zla artm\u0131\u015ft\u0131r. Sadece 2022 y\u0131l\u0131nda, bu siber sald\u0131r\u0131lar \u015fu ana kadar t\u00fcm siber doland\u0131r\u0131c\u0131l\u0131klar\u0131n %41&#8217;ini olu\u015fturmaktad\u0131r. Vishing (Voice phishing) Nedir? Sesli oltalama olarak da bilinen vishing, bilgisayar korsanlar\u0131n\u0131n hedeflenen ki\u015fileri ba\u015fka biriymi\u015f gibi davranarak [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3888,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[],"class_list":["post-3840","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r? - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r? - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Son zamanlardaki siber sald\u0131r\u0131 t\u00fcrlerinden biri de vishing sald\u0131r\u0131s\u0131d\u0131r. IBM&#8217;in X-Force taraf\u0131ndan yay\u0131nlanan bir rapora g\u00f6re, vishing sald\u0131r\u0131lar\u0131 son birka\u00e7 y\u0131lda h\u0131zla artm\u0131\u015ft\u0131r. Sadece 2022 y\u0131l\u0131nda, bu siber sald\u0131r\u0131lar \u015fu ana kadar t\u00fcm siber doland\u0131r\u0131c\u0131l\u0131klar\u0131n %41&#8217;ini olu\u015fturmaktad\u0131r. Vishing (Voice phishing) Nedir? Sesli oltalama olarak da bilinen vishing, bilgisayar korsanlar\u0131n\u0131n hedeflenen ki\u015fileri ba\u015fka biriymi\u015f gibi davranarak [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-23T14:18:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-23T14:18:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r? - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/","og_locale":"tr_TR","og_type":"article","og_title":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r? - Uzman Posta","og_description":"Son zamanlardaki siber sald\u0131r\u0131 t\u00fcrlerinden biri de vishing sald\u0131r\u0131s\u0131d\u0131r. IBM&#8217;in X-Force taraf\u0131ndan yay\u0131nlanan bir rapora g\u00f6re, vishing sald\u0131r\u0131lar\u0131 son birka\u00e7 y\u0131lda h\u0131zla artm\u0131\u015ft\u0131r. Sadece 2022 y\u0131l\u0131nda, bu siber sald\u0131r\u0131lar \u015fu ana kadar t\u00fcm siber doland\u0131r\u0131c\u0131l\u0131klar\u0131n %41&#8217;ini olu\u015fturmaktad\u0131r. Vishing (Voice phishing) Nedir? Sesli oltalama olarak da bilinen vishing, bilgisayar korsanlar\u0131n\u0131n hedeflenen ki\u015fileri ba\u015fka biriymi\u015f gibi davranarak [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-11-23T14:18:16+00:00","article_modified_time":"2023-11-23T14:18:18+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r?","datePublished":"2023-11-23T14:18:16+00:00","dateModified":"2023-11-23T14:18:18+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/"},"wordCount":2410,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg","articleSection":["G\u00fcvenlik"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/","url":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/","name":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r? - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg","datePublished":"2023-11-23T14:18:16+00:00","dateModified":"2023-11-23T14:18:18+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/vishing-voice-phishing-nedir-buna-karsi-nasil-koruma-saglanir.jpeg","width":1000,"height":500,"caption":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r?"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/vishing-voice-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Vishing (Voice Phishing) Nedir? Buna Kar\u015f\u0131 Nas\u0131l Koruma Sa\u011flan\u0131r?"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3840","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3840"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3840\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3888"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}