{"id":889,"date":"2020-11-08T17:00:10","date_gmt":"2020-11-08T14:00:10","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=889"},"modified":"2025-05-12T01:28:15","modified_gmt":"2025-05-11T22:28:15","slug":"e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/","title":{"rendered":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey"},"content":{"rendered":"\n<p>E-posta hesab\u0131n\u0131z sald\u0131r\u0131ya u\u011frad\u0131ysa, hassas veriler h\u0131zl\u0131 bir \u015fekilde yanl\u0131\u015f ellere ge\u00e7ebilir. Bilgisayar korsanlar\u0131 \u00e7evrimi\u00e7i \u00f6deme hizmetlerinize eri\u015febilir, sizin ad\u0131n\u0131za al\u0131\u015fveri\u015f yapabilir, kurum s\u0131rlar\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131karabilir ve buldu\u011fu di\u011fer bilgilerle size \u015fantaj yapabilir. Hacklenme&#8217;nin etkileri her ne kadar k\u00f6t\u00fc olursa olsun, paniklemek yerine sakin olman\u0131z gerekir. \u00c7\u00fcnk\u00fc \u00e7o\u011fu durumda, k\u00f6t\u00fc bir \u015fey olmadan \u00f6nce hesab\u0131n\u0131z\u0131n kontrol\u00fcn\u00fc yeniden kazanabilirsiniz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">E-posta Hesab\u0131n\u0131z Hacklenirse Ne Yapmal\u0131s\u0131n\u0131z?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"750\" height=\"375\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklenirse-ne-yapmalisiniz.png\" alt=\"E-posta Hesab\u0131n\u0131z Hacklenirse Ne Yapmal\u0131s\u0131n\u0131z?\" class=\"wp-image-891\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklenirse-ne-yapmalisiniz.png 750w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklenirse-ne-yapmalisiniz-300x150.png 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklenirse-ne-yapmalisiniz-360x180.png 360w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/figure><\/div>\n\n\n\n<p>A\u015fa\u011f\u0131da e-posta hesab\u0131n\u0131z hacklenirse ne yapaca\u011f\u0131n\u0131za dair bir liste bulacaks\u0131n\u0131z:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Hesab\u0131n\u0131z\u0131 giri\u015f yapmay\u0131 deneyin<\/h3>\n\n\n\n<p>Hesab\u0131n\u0131za her zamanki gibi giri\u015f yapmay\u0131 deneyin. Bunu sorunsuz bir \u015fekilde yapabiliyorsan\u0131z, \u015fifrenizin bilgisayar korsanlar\u0131 taraf\u0131ndan hen\u00fcz de\u011fi\u015ftirilmedi\u011fi anlam\u0131na gelir. Bu y\u00fczden en k\u0131sa zamanda \u015fifrenizi de\u011fi\u015ftirmeniz gerekir. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Parolalar\u0131n\u0131z\u0131 De\u011fi\u015ftirin<\/h3>\n\n\n\n<p>Hesab\u0131n\u0131za eri\u015ftiyseniz, e-posta sa\u011flay\u0131c\u0131n\u0131z\u0131n web sitesine gidin ve hesap ayarlar\u0131n\u0131zdaki \u015fifreyi de\u011fi\u015ftirin. Daha sonra, yeni \u015fifreyi kullanarak t\u00fcm cihazlar\u0131n\u0131zda oturum a\u00e7\u0131n, aksi takdirde gelen postalarla ilgili bildirim almazs\u0131n\u0131z. Ayr\u0131ca sadece e-posta hesab\u0131n\u0131z i\u00e7in kullanaca\u011f\u0131n\u0131z bir \u015fifre se\u00e7in. Bu \u015fifreyi hala ba\u015fka bir web sitesinde kullan\u0131yorsan\u0131z, hemen de\u011fi\u015ftirin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. 2 Ad\u0131ml\u0131 Do\u011frulamay\u0131 Etkinle\u015ftirin<\/h3>\n\n\n\n<p>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama (2FA veya iki ad\u0131ml\u0131 do\u011frulama olarak da bilinir) hesab\u0131n\u0131z i\u00e7in ek bir g\u00fcvenlik katman\u0131d\u0131r. E-posta sa\u011flay\u0131c\u0131n\u0131za, \u015fifrenizi kullanarak hesab\u0131n\u0131za giri\u015f yapmaya \u00e7al\u0131\u015fan ki\u015finin asl\u0131nda siz oldu\u011funuzu do\u011frulama imkan\u0131 verir. \u00c7o\u011fu e-posta sa\u011flay\u0131c\u0131s\u0131 art\u0131k bu se\u00e7ene\u011fi sunmaktad\u0131r.<\/p>\n\n\n\n<p>2FA&#8217;y\u0131 etkinle\u015ftirdikten sonra, hesab\u0131n\u0131za yeni bir cihazdan giri\u015f yapmaya \u00e7al\u0131\u015f\u0131yorsan\u0131z sa\u011flay\u0131c\u0131 ek kimlik do\u011frulama isteyecektir. Bu, bir k\u0131sa mesaj veya cep telefonunuzdaki \u00f6zel bir uygulama arac\u0131l\u0131\u011f\u0131yla sa\u011flanan 5 veya 6 basamakl\u0131 bir kod olabilir.<\/p>\n\n\n\n<p>Bazen sizden biyometrik bilgiler istenebilir (bu genellikle diz\u00fcst\u00fc bilgisayar\u0131n\u0131zdaki veya telefonunuzdaki yerle\u015fik bir sens\u00f6r arac\u0131l\u0131\u011f\u0131yla sa\u011flanan bir parmak izidir). \u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama, bilgilerinizi g\u00fcvende tutman\u0131n en etkili yollar\u0131ndan biridir, bu nedenle kurulumu zor gibi g\u00f6r\u00fcnse bile l\u00fctfen bu ad\u0131m\u0131 g\u00f6z ard\u0131 etmeyin.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Mailleriniz \u0130\u00e7in Vir\u00fcs Taramas\u0131 Ba\u015flat\u0131n<\/h3>\n\n\n\n<p>E-postan\u0131n yan\u0131 s\u0131ra bilgisayar korsanlar\u0131 cihaz\u0131n\u0131za k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da bula\u015ft\u0131rabilir. Bu noktada bilgisayar\u0131n\u0131z\u0131 kontrol etmek i\u00e7in bir antivir\u00fcs taramas\u0131 yapman\u0131z gerekir. Ard\u0131ndan, taray\u0131c\u0131lar\u0131n\u0131z\u0131n ve uygulamalar\u0131n\u0131z\u0131n en son s\u00fcr\u00fcme g\u00fcncellendi\u011finden emin olman\u0131z \u015fartt\u0131r.<\/p>\n\n\n\n<p>Y\u00fckl\u00fc \u00fc\u00e7\u00fcnc\u00fc taraf uzant\u0131 veya uygulamalar\u0131n\u0131z varsa, \u00f6zellikle de art\u0131k kullanm\u0131yorsan\u0131z, bunlar\u0131 kald\u0131rman\u0131z daha iyi olacakt\u0131r. Mac kullan\u0131yor olsan\u0131z bile bu uygulamalardan herhangi biri daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7in bir ge\u00e7it olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. G\u00fcvenlik sorular\u0131n\u0131 cevaplay\u0131n<\/h3>\n\n\n\n<p>Parola yetkisiz ki\u015filer taraf\u0131ndan de\u011fi\u015ftirilmi\u015fse, bir veya daha fazla g\u00fcvenlik sorusunu yan\u0131tlayarak hesab\u0131n\u0131z\u0131n kontrol\u00fcn\u00fc yeniden kazanabilirsiniz. Bunu yapmak i\u00e7in &#8221;\u015eifrenizi mi unuttunuz?&#8221; \u00f6zelli\u011fini kullan\u0131n. Kar\u015f\u0131n\u0131za baz\u0131 g\u00fcvenlik sorular\u0131 gelecek. Genellikle bu sorular\u0131n cevab\u0131n\u0131 bilen tek ki\u015fi siz olursunuz. Cevaplar\u0131 do\u011fru verdi\u011finiz takdirde hesab\u0131n\u0131z\u0131 kurtarabilirsiniz.\u00a0Baz\u0131 e-posta sa\u011flay\u0131c\u0131lar\u0131 ise, eri\u015fim izni verip vermeyece\u011finizi sormak i\u00e7in cep telefonu numaran\u0131z\u0131 veya ikinci bir e-posta adresini ister. Bu sorular do\u011fru cevaplan\u0131rsa, e-posta yoluyla size yeni bir \u015fifre g\u00f6nderilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. E-posta Hesab\u0131n\u0131zla \u0130li\u015fkili Di\u011fer Hizmetleri Kontrol Edin<\/h3>\n\n\n\n<p>Ana e-posta hesab\u0131n\u0131z\u0131 (di\u011fer hesaplar\u0131n\u0131za da eri\u015fim sa\u011flayan) g\u00fcvence alt\u0131na ald\u0131ktan sonra bu di\u011fer hesaplar\u0131n \u015fifrelerini de de\u011fi\u015ftirmeniz gerekir. Buna a\u015fa\u011f\u0131dakiler dahildir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Sosyal medya profilleriniz<\/li><li>\u0130nternet bankac\u0131l\u0131\u011f\u0131 uygulamalar\u0131<\/li><li>Bulut depolama ve \u00e7e\u015fitli \u00e7evrimi\u00e7i yedeklemeler<\/li><\/ul>\n\n\n\n<p>Siber sald\u0131r\u0131ya u\u011frayan e-postaya ba\u011fl\u0131 di\u011fer hesaplara eri\u015fimde herhangi bir sorun ya\u015farsan\u0131z, derhal \u015fifrelerinizi s\u0131f\u0131rlamay\u0131 deneyin ve m\u00fc\u015fteri hizmetleriyle ileti\u015fime ge\u00e7in.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. E-posta Hizmet Sa\u011flay\u0131c\u0131n\u0131za Durumu Bildirin<\/h3>\n\n\n\n<p>Siber sald\u0131r\u0131 olay\u0131n\u0131 e-posta sa\u011flay\u0131c\u0131n\u0131z\u0131n destek ekibine bildirin. Sa\u011flay\u0131c\u0131n\u0131z\u0131 teknik ekipleri, hesab\u0131n\u0131z\u0131 kurtarma konusunda daha fazla rehberlik sa\u011flayabilir ve ek g\u00fcvenlik \u00f6nlemleri sunabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Kimlik Koruma Se\u00e7eneklerinizi G\u00f6z \u00d6n\u00fcnde Bulundurun<\/h3>\n\n\n\n<p>Hesab\u0131n\u0131z ele ge\u00e7irildiyse, ayn\u0131 \u015fifreyi kulland\u0131\u011f\u0131n\u0131z t\u00fcm platformlarda \u015fifrelerinizi hemen de\u011fi\u015ftirin. T\u00fcm \u00f6nemli hesaplar\u0131n\u0131zda iki ad\u0131ml\u0131 do\u011frulama, biyometrik kimlik do\u011frulama ve g\u00fcvenlik bildirimleri gibi ek koruma katmanlar\u0131n\u0131 etkinle\u015ftirin. Banka, e-devlet ve e-posta servislerinde ola\u011fan d\u0131\u015f\u0131 etkinlikleri kontrol edin. Dijital kimli\u011finizi sadece \u015fifreyle de\u011fil, \u00e7ok katmanl\u0131 g\u00fcvenlikle koruyun.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlar \u0130\u00e7in Kurtarma Diski Kullan\u0131n<\/h3>\n\n\n\n<p>Bir kurtarma diski veya \u00e7evrimi\u00e7i bir taray\u0131c\u0131 ile t\u00fcm sisteminizi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 tarayabilirsiniz. T\u00fcm b\u00fcy\u00fck anti-vir\u00fcs yaz\u0131l\u0131m\u0131 geli\u015ftiricilerinden edinilebilecek kurtarma diskleri ile k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n \u015fifrenizi \u00e7al\u0131p \u00e7almad\u0131\u011f\u0131ndan kesinlikle emin olabilirsiniz. Bilgisayar\u0131n\u0131zda k\u00f6t\u00fc ama\u00e7l\u0131 bir program yoksa, muhtemelen bir kimlik av\u0131 postas\u0131n\u0131n veya b\u00fcy\u00fck \u00f6l\u00e7ekli veri h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131n hedefi oldu\u011funuz anlam\u0131na gelir.<\/p>\n\n\n\n<p>Sonu\u00e7 olarak e-posta hesab\u0131n\u0131z hacklendiyse, t\u00fcm parolalar\u0131n\u0131z\u0131 de\u011fi\u015ftirmeniz gerekir. \u00d6rne\u011fin, bilgisayar\u0131n\u0131za bir keylogger y\u00fcklendiyse, bilgisayar korsanlar\u0131 di\u011fer parolalar\u0131n\u0131za da eri\u015fmi\u015f olabilir. G\u00fcvenli parolalar\u0131n hat\u0131rlanmas\u0131 zor olabilece\u011finden, onlar\u0131 sizin i\u00e7in hat\u0131rlayan bir parola y\u00f6neticisi kullanabilirsiniz. Programlar, t\u00fcm parolalar\u0131n\u0131z\u0131 y\u00f6netir ve size bunlar\u0131 d\u00fczenli aral\u0131klarla de\u011fi\u015ftirmenizi hat\u0131rlat\u0131r, b\u00f6ylece i\u015fler daha kolay hale gelir.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bir E-posta Hesab\u0131 Nas\u0131l Hacklenebilir?<\/h2>\n\n\n\n<p>Bilgisayar korsanlar\u0131, e-posta adreslerini ve \u015fifrelerini ele ge\u00e7irmek i\u00e7in farkl\u0131 y\u00f6ntemler kullan\u0131r. Bu y\u00f6ntemlerden baz\u0131lar\u0131 a\u015fa\u011f\u0131daki gibidir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Phishing (Oltalama) Sald\u0131r\u0131lar\u0131<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131lara t\u0131klaman\u0131z i\u00e7in sizi kand\u0131rmak amac\u0131yla sahte e-postalar veya mesajlar g\u00f6nderir. Bu ba\u011flant\u0131lar genellikle fark\u0131nda olmadan e-posta kimlik bilgilerinizi girdi\u011finiz sahte giri\u015f sayfalar\u0131na y\u00f6nlendirir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Veri \u0130hlalleri<\/h3>\n\n\n\n<p>B\u00fcy\u00fck kurumlara yap\u0131lan siber sald\u0131r\u0131lar sonucunda milyonlarca m\u00fc\u015fterinin e-posta ve \u015fifresi a\u00e7\u0131\u011fa \u00e7\u0131kabilir. Bilgisayar korsanlar\u0131 bu verilere kolayca eri\u015ferek size ait farkl\u0131 hesaplar\u0131n\u0131zda ayn\u0131 \u015fifreyi ve kombinasyonlar\u0131 denemeye ba\u015flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Tahmin Edilebilir \u015eifreler<\/h3>\n\n\n\n<p>\u0130sminiz, do\u011fum tarihiniz, &#8221;123456&#8221; gibi zay\u0131f ve kolay tahmin edilebilir \u015fifreler, hesaplar\u0131n h\u0131zl\u0131ca ele ge\u00e7irilmesini sa\u011flar. \u00d6zellikle ayn\u0131 \u015fifreyi birden fazla hesapta kullanmak bu riski daha da art\u0131r\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Veri S\u0131z\u0131nt\u0131lar\u0131ndan Faydalanmak (Credential Stuffing)<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, eri\u015fim elde etmek i\u00e7in ge\u00e7mi\u015f veri ihlallerinden kullan\u0131c\u0131 ad\u0131 ve parola kombinasyonlar\u0131n\u0131 denemek \u00fczere otomatik ara\u00e7lar kullan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Sosyal M\u00fchendislik<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, genellikle g\u00fcvenilir ki\u015fi veya kurumlar\u0131n kimli\u011fine b\u00fcr\u00fcnerek gizli bilgilerinizi vermeniz i\u00e7in sizi manip\u00fcle eder.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131mlar ve Keylogger&#8217;lar<\/h3>\n\n\n\n<p>Siber su\u00e7lular\u0131n hassas verileri ele ge\u00e7irmek i\u00e7in kulland\u0131klar\u0131 hackleme y\u00f6ntemlerinden biri de, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131s\u0131 ger\u00e7ekle\u015ftirmektir. K\u00f6t\u00fc ama\u00e7l\u0131 programlar genellikle sahte dosya adlar\u0131yla e-posta eklerinde g\u00f6nderilir. Bu eklerden biri a\u00e7\u0131l\u0131rsa, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m otomatik olarak kullan\u0131c\u0131n\u0131n bilgisayar\u0131na y\u00fcklenecektir. <\/p>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m programlar\u0131 arka planda sessizce ve gizlice \u00e7al\u0131\u015f\u0131r ve hassas verileri ve \u015fifreleri izler. \u00d6rne\u011fin, tu\u015f kaydediciler, vir\u00fcs bula\u015fm\u0131\u015f bilgisayardaki t\u00fcm klavye giri\u015flerini kaydeder ve verileri, \u015fifreler dahil olmak \u00fczere bilgisayar korsanlar\u0131na iletir. Casus yaz\u0131l\u0131mlara kar\u015f\u0131 en etkili koruma, her zaman g\u00fcncel anti-vir\u00fcs korumas\u0131na sahip olmak ve bilgisayar\u0131n\u0131zda etkin bir g\u00fcvenlik duvar\u0131n\u0131n kurulu olmas\u0131d\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. 2FA Y\u00f6ntemlerinin Atlat\u0131lmas\u0131 (SIM Swapping)<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, telefon hatt\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in GSM operat\u00f6rlerini kand\u0131rarak SIM kart de\u011fi\u015fimi yapabilir. Bu sayede iki fakt\u00f6rl\u00fc do\u011frulama (2FA) kodlar\u0131 do\u011frudan bilgisayar korsan\u0131n\u0131n cihaz\u0131na gider ve hesab\u0131n\u0131za eri\u015fim sa\u011flan\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">8. Herkese A\u00e7\u0131k Bir Bilgisayar\u0131 veya Cihaz\u0131 Kulland\u0131ktan Sonra Oturumu Kapatmamak<\/h3>\n\n\n\n<p>Okul, k\u00fct\u00fcphane veya ba\u015fkas\u0131n\u0131n bilgisayar\u0131nda oturum a\u00e7t\u0131ktan sonra \u00e7\u0131k\u0131\u015f yapmamak, sizden sonra o cihaz\u0131 kullanan birinin e-posta hesab\u0131n\u0131za eri\u015fmesine neden olabilir. Oturumu a\u00e7\u0131k b\u0131rakmak ciddi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">9. G\u00fcvenli\u011fi Sa\u011flanmam\u0131\u015f Halka A\u00e7\u0131k Bir Wi-Fi A\u011f\u0131 Kullanmak<\/h3>\n\n\n\n<p>\u00d6zellikle kafeler gibi \u015fifre korumas\u0131 olmayan ya da g\u00fcvenlik protokol\u00fc zay\u0131f olan Wi-Fi a\u011flar\u0131 \u00fczerinden yap\u0131lan i\u015flemler, kolayl\u0131kla dinlenebilir. Bilgisayar korsanlar\u0131, ayn\u0131 a\u011fa ba\u011fl\u0131 cihazlardaki veri trafi\u011fini izleyerek e-posta bilgilerinize ula\u015fabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">10. A\u00e7\u0131k Kaynaklardan Bilgi Toplama (OSINT)<\/h3>\n\n\n\n<p>Bilgisayar korsonlar\u0131, sosyal medya hesaplar\u0131, blog yaz\u0131lar\u0131, LinkedIn profilleri gibi herkese a\u00e7\u0131k kaynaklardan sizin hakk\u0131n\u0131zda bilgi toplar. Bu bilgileri daha inand\u0131r\u0131c\u0131 sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131 veya \u015fifre tahminleri i\u00e7in kullan\u0131rlar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">11. E-posta \u0130stemcisi G\u00fcvenlik A\u00e7\u0131klar\u0131<\/h3>\n\n\n\n<p>Kulland\u0131\u011f\u0131n\u0131z e-posta uygulamas\u0131 (\u00f6rne\u011fin eski bir Outlook s\u00fcr\u00fcm\u00fc veya g\u00fcncellenmemi\u015f mobil uygulama) kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bar\u0131nd\u0131r\u0131yorsa, bilgisayar korsanlar\u0131 bu a\u00e7\u0131klardan yararlanarak hesab\u0131n\u0131za s\u0131zabilir. Bu y\u00fczden yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 her zaman g\u00fcncel tutman\u0131z gerekir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">12. Eklenti veya Makro \u0130\u00e7eren Zararl\u0131 Dosyalar<\/h3>\n\n\n\n<p>Word, Excel gibi dosyalara g\u00f6m\u00fclen zararl\u0131 makrolar, dosya a\u00e7\u0131ld\u0131\u011f\u0131nda arka planda k\u00f6t\u00fc ama\u00e7l\u0131 kodlar\u0131n \u00e7al\u0131\u015fmas\u0131na neden olabilir. Bu kodlar bilgisayar\u0131n\u0131za k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rabilir ve e-posta bilgilerinizin \u00e7al\u0131nmas\u0131na nedne olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">13. Kimlik Av\u0131 Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/h3>\n\n\n\n<p>Kimlik av\u0131, al\u0131c\u0131n\u0131n sahte web sitelerine ki\u015fisel bilgilerini girmesinin istendi\u011fi sahte e-posta\u2019lardan g\u00f6nderilen e-posta\u2019lard\u0131r. Bu e-postalar, bilinen bir web sitesinden geliyormu\u015f gibi g\u00f6r\u00fcn\u00fcr ve g\u00fcvenlik nedeniyle al\u0131c\u0131n\u0131n \u015fifresini ister. Ki\u015fi daha sonra aldat\u0131c\u0131 bir \u015fekilde ger\u00e7ek siteye benzeyen sahte bir web sitesine y\u00f6nlendirilir. Ancak, \u015fifre ne kadar g\u00fcvenli oldu\u011funu g\u00f6rmek i\u00e7in test edilmemi\u015ftir, bunun yerine do\u011frudan bilgisayar korsanlar\u0131na g\u00f6nderilir. Yasal web siteleri, posta sa\u011flay\u0131c\u0131lar\u0131, \u00f6deme hizmetleri ve \u00e7evrimi\u00e7i ma\u011fazalar, kullan\u0131c\u0131lar\u0131n\u0131n \u015fifrelerini e-posta yoluyla asla istemez. Bilgilerinizi sadece soran birine vermeyin. Bir e-posta&#8217;n\u0131n yasal olup olmad\u0131\u011f\u0131ndan emin de\u011filseniz, ilgili web sitesine bak\u0131n.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">E-posta Hesab\u0131m\u0131n Hackledi\u011fini Nas\u0131l Anlar\u0131m?<\/h2>\n\n\n\n<p>\u0130\u015f arkada\u015flar\u0131n\u0131z veya aileniz sizden garip bir e-posta al\u0131rsa, e-postan\u0131z\u0131n siber sald\u0131r\u0131ya u\u011frad\u0131\u011f\u0131n\u0131 belirten bir bildirimle size geri yazabilirler. Ancak, bazen birinin sisteminize s\u0131zd\u0131\u011f\u0131na dair herhangi bildirim almayabilirsiniz. Fakat bir \u015feylerin yanl\u0131\u015f gitti\u011fini anlaman\u0131za yard\u0131mc\u0131 olacak birka\u00e7 i\u015faret vard\u0131r. Bunlar a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>E-posta hesab\u0131n\u0131za girerken sorun ya\u015f\u0131yorsan\u0131z, e-posta kutunuza eri\u015fmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131zda kullan\u0131c\u0131 ad\u0131n\u0131z\u0131n veya \u015fifrenizin do\u011fru olmad\u0131\u011f\u0131na dair bir bildirim al\u0131yorsan\u0131z, bu birisinin hesap bilgilerinizi de\u011fi\u015ftirdi\u011fi anlam\u0131na gelir.<\/li><li>G\u00f6nderilen mesajlar\u0131n bulundu\u011fu klas\u00f6r farkl\u0131 g\u00f6r\u00fcn\u00fcyorsa, klas\u00f6r, hakk\u0131nda hi\u00e7bir fikrinizin olmad\u0131\u011f\u0131 sahte mesajlar i\u00e7eriyorsa veya tamamen bo\u015fsa ve e-postalar\u0131n\u0131z\u0131 silmedi\u011finizden eminseniz, e-postan\u0131z hacklenmi\u015f olabilir.<\/li><li>Sosyal medya hesaplar\u0131n\u0131zda garip mesajlar al\u0131yorsan\u0131z, en son tweet&#8217;inizde veya Instagram payla\u015f\u0131m\u0131n\u0131zda hi\u00e7 kullanmad\u0131\u011f\u0131n\u0131z bir \u00f6\u011fe yer al\u0131yorsa, bir bilgisayar korsan\u0131n\u0131n yaln\u0131zca e-postaya de\u011fil, sosyal a\u011f hesab\u0131na da eri\u015fim sa\u011flad\u0131\u011f\u0131na i\u015faret ediyor olabilir. Bir bilgisayar korsan\u0131 &#8221;\u015fifremi unuttum&#8221; se\u00e7ene\u011fine t\u0131klayarak \u015fifrenizi s\u0131f\u0131rlar ve hesaplar\u0131n\u0131z\u0131 kontrol etmeye ba\u015flar.<\/li><\/ul>\n\n\n\n<p>E-postan\u0131z\u0131n kredi kart\u0131 ve banka hesab\u0131 gibi bir\u00e7ok \u00f6nemli bilgi i\u00e7erdi\u011fini unutmay\u0131n. Bir bilgisayar korsan\u0131 e-posta hesab\u0131n\u0131za eri\u015firse, t\u00fcm verileriniz y\u00fcksek risk alt\u0131ndad\u0131r. Bu nedenle, olas\u0131 riskleri ve hasar\u0131 en aza indirmek i\u00e7in h\u0131zl\u0131 ve ak\u0131ll\u0131ca hareket etmeniz gerekir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hackerlar E-posta Adresinizle Ne Yapabilir?<\/h2>\n\n\n\n<p>E-posta sald\u0131r\u0131lar\u0131 sonucunda hackerler e-postan\u0131z\u0131 a\u015fa\u011f\u0131daki \u015fekilde kullanabilir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Finansal Kazan\u00e7: <\/strong>Bilgisayar korsanlar\u0131, bir \u015firketteki \u00e7al\u0131\u015fanlar\u0131n e-posta hesaplar\u0131na eri\u015fim sa\u011flayarak finansal doland\u0131r\u0131c\u0131l\u0131k ve kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 i\u00e7in kullan\u0131labilecek banka hesap bilgileri, i\u015flem verileri ve m\u00fc\u015fteri bilgileri gibi de\u011ferli bilgileri potansiyel olarak bulabilir.<\/li><li><strong>\u0130\u00e7eriden \u00d6\u011frenilen Bilgiler: <\/strong>Bilgisayar korsanlar\u0131, i\u00e7eriden bilgi edinmek i\u00e7in y\u00f6netici e-postalar\u0131na eri\u015fmeye \u00e7al\u0131\u015fabilir, bu da bilgileri di\u011fer yasa d\u0131\u015f\u0131 ama\u00e7lar i\u00e7in kullanmalar\u0131na olanak tan\u0131r.<\/li><li><strong>Fidye Sald\u0131r\u0131lar\u0131: <\/strong>Bilgisayar korsanlar\u0131, kritik verileri \u015fifrelemek ve \u015fifre \u00e7\u00f6zme anahtar\u0131 kar\u015f\u0131l\u0131\u011f\u0131nda fidye talep etmek i\u00e7in \u015firketlerinin e-posta sistemlerini hedef alan fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131 d\u00fczenleyebilir. \u015eirketler verilerine ve ileti\u015fimlerine eri\u015fime b\u00fcy\u00fck \u00f6l\u00e7\u00fcde g\u00fcvendikleri i\u00e7in, kontrol\u00fc h\u0131zl\u0131 bir \u015fekilde yeniden kazanmak i\u00e7in fidye \u00f6demeye daha meyilli olabilirler.<\/li><li><strong>Kimlik Av\u0131 Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131:<\/strong> Bilgisayar korsanlar\u0131, \u00e7al\u0131\u015fanlar\u0131 hassas bilgileri if\u015fa etmeleri veya sahte hesaplara para aktarmalar\u0131 konusunda kand\u0131rmak i\u00e7in m\u00fc\u015fteriler, ortaklar veya di\u011fer \u00e7al\u0131\u015fanlar gibi davranan sahte e-postalar g\u00f6nderebilir.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">E-posta Korsanl\u0131\u011f\u0131 Nas\u0131l \u00d6nlenir?<\/h2>\n\n\n\n<p>E-posta korsanl\u0131\u011f\u0131 ile ilgili bir\u00e7ok uygulama olsa da, bilgisayar korsanlar\u0131n\u0131n e-posta hesaplar\u0131n\u0131z\u0131 ele ge\u00e7irmesini \u00f6nlemenin en iyi yolu kimlik do\u011frulaman\u0131z\u0131 g\u00fc\u00e7lendirmektir. En \u00f6nemli \u00e7\u00f6z\u00fcmlerden biri, kullan\u0131c\u0131lar\u0131n hesapta oturum a\u00e7arken parolaya ek olarak ikincil bir belirtece sahip olmalar\u0131n\u0131 gerektiren iki fakt\u00f6rl\u00fc kimlik do\u011frulama kullanmakt\u0131r. Daha da g\u00fc\u00e7l\u00fc bir \u00e7\u00f6z\u00fcm, parola ihtiyac\u0131n\u0131 tamamen ortadan kald\u0131ran ve bilgisayar korsanlar\u0131n\u0131n kimlik av\u0131 yoluyla hesaplara eri\u015fmesini imkans\u0131z hale getiren parolas\u0131z kimlik do\u011frulama teknolojilerinin kullan\u0131lmas\u0131d\u0131r.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>E-posta hesab\u0131n\u0131z sald\u0131r\u0131ya u\u011frad\u0131ysa, hassas veriler h\u0131zl\u0131 bir \u015fekilde yanl\u0131\u015f ellere ge\u00e7ebilir. Bilgisayar korsanlar\u0131 \u00e7evrimi\u00e7i \u00f6deme hizmetlerinize eri\u015febilir, sizin ad\u0131n\u0131za al\u0131\u015fveri\u015f yapabilir, kurum s\u0131rlar\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131karabilir ve buldu\u011fu di\u011fer bilgilerle size \u015fantaj yapabilir. Hacklenme&#8217;nin etkileri her ne kadar k\u00f6t\u00fc olursa olsun, paniklemek yerine sakin olman\u0131z gerekir. \u00c7\u00fcnk\u00fc \u00e7o\u011fu durumda, k\u00f6t\u00fc bir \u015fey olmadan \u00f6nce hesab\u0131n\u0131z\u0131n [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":890,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nedir-nasil-yapilir"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"E-posta hesab\u0131n\u0131z sald\u0131r\u0131ya u\u011frad\u0131ysa, hassas veriler h\u0131zl\u0131 bir \u015fekilde yanl\u0131\u015f ellere ge\u00e7ebilir. Bilgisayar korsanlar\u0131 \u00e7evrimi\u00e7i \u00f6deme hizmetlerinize eri\u015febilir, sizin ad\u0131n\u0131za al\u0131\u015fveri\u015f yapabilir, kurum s\u0131rlar\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131karabilir ve buldu\u011fu di\u011fer bilgilerle size \u015fantaj yapabilir. Hacklenme&#8217;nin etkileri her ne kadar k\u00f6t\u00fc olursa olsun, paniklemek yerine sakin olman\u0131z gerekir. \u00c7\u00fcnk\u00fc \u00e7o\u011fu durumda, k\u00f6t\u00fc bir \u015fey olmadan \u00f6nce hesab\u0131n\u0131z\u0131n [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-08T14:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-11T22:28:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/","og_locale":"tr_TR","og_type":"article","og_title":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey - Uzman Posta","og_description":"E-posta hesab\u0131n\u0131z sald\u0131r\u0131ya u\u011frad\u0131ysa, hassas veriler h\u0131zl\u0131 bir \u015fekilde yanl\u0131\u015f ellere ge\u00e7ebilir. Bilgisayar korsanlar\u0131 \u00e7evrimi\u00e7i \u00f6deme hizmetlerinize eri\u015febilir, sizin ad\u0131n\u0131za al\u0131\u015fveri\u015f yapabilir, kurum s\u0131rlar\u0131n\u0131 a\u00e7\u0131\u011fa \u00e7\u0131karabilir ve buldu\u011fu di\u011fer bilgilerle size \u015fantaj yapabilir. Hacklenme&#8217;nin etkileri her ne kadar k\u00f6t\u00fc olursa olsun, paniklemek yerine sakin olman\u0131z gerekir. \u00c7\u00fcnk\u00fc \u00e7o\u011fu durumda, k\u00f6t\u00fc bir \u015fey olmadan \u00f6nce hesab\u0131n\u0131z\u0131n [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2020-11-08T14:00:10+00:00","article_modified_time":"2025-05-11T22:28:15+00:00","og_image":[{"width":750,"height":375,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png","type":"image\/png"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"11 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey","datePublished":"2020-11-08T14:00:10+00:00","dateModified":"2025-05-11T22:28:15+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/"},"wordCount":2519,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png","articleSection":["Nedir? Nas\u0131l Yap\u0131l\u0131r?"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/","url":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/","name":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png","datePublished":"2020-11-08T14:00:10+00:00","dateModified":"2025-05-11T22:28:15+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/11\/eposta-hesabiniz-hacklendiginde-yapmaniz-gereken-3-sey.png","width":750,"height":375,"caption":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/e-posta-hesabiniz-hacklendiginde-yapmaniz-gerekenler\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Nedir? Nas\u0131l Yap\u0131l\u0131r?","item":"https:\/\/uzmanposta.com\/blog\/nedir-nasil-yapilir\/"},{"@type":"ListItem","position":3,"name":"E-posta Hesab\u0131n\u0131z Hacklendi\u011finde Yapman\u0131z Gereken 3 \u015eey"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=889"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/889\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/890"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}