{"id":10348,"date":"2021-12-10T15:07:34","date_gmt":"2021-12-10T12:07:34","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10348"},"modified":"2021-12-10T15:07:34","modified_gmt":"2021-12-10T12:07:34","slug":"protect-your-app","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/protect-your-app\/10348\/","title":{"rendered":"Mobil uygulamalar\u0131n korumaya ihtiya\u00e7 duymas\u0131n\u0131n be\u015f nedeni"},"content":{"rendered":"<p>Gizli kullan\u0131c\u0131 bilgilerini kullanan mobil uygulamalar\u0131n g\u00fcvenilir bir ortamda \u00e7al\u0131\u015fmas\u0131 gerekir. Bununla yaln\u0131zca bankac\u0131l\u0131k uygulamalar\u0131n\u0131 kastetmiyoruz. Siber su\u00e7lular paran\u0131n yan\u0131 s\u0131ra, sadakat program\u0131 puanlar\u0131n\u0131n, indirim kartlar\u0131n\u0131n, kripto para c\u00fczdanlar\u0131n\u0131n ve \u00e7ok daha fazlas\u0131n\u0131n pe\u015fine d\u00fc\u015f\u00fcyor.<\/p>\n<p>Bu t\u00fcr uygulama yarat\u0131c\u0131lar\u0131n\u0131n, bir kullan\u0131c\u0131n\u0131n cihaz\u0131n\u0131n ne kadar korumal\u0131 oldu\u011funu ya da kullan\u0131c\u0131lar\u0131n siber tehditlere ne kadar haz\u0131rl\u0131kl\u0131 oldu\u011funu bilmesi m\u00fcmk\u00fcn de\u011fil. M\u00fc\u015fterilerinizin mobil g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kulland\u0131\u011f\u0131n\u0131 ummak yerine, geli\u015ftirdi\u011finiz uygulamay\u0131 kullanc\u0131y\u0131 koruyan ilave teknolojilerle donatabilirsiniz. \u0130\u015fte bunu yapman\u0131z i\u00e7in 5 neden:<\/p>\n<h2>1. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar<\/h2>\n<p>Her zaman bir tehdit olan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, kullan\u0131c\u0131n\u0131n telefonuna veya tabletine uygulama y\u00fcklemek i\u00e7in kulland\u0131\u011f\u0131 kaynaktan gelebilir. Resmi uygulama ma\u011fazalar\u0131n\u0131 kullanmak bile <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/minecraft-mod-adware-google-play-revisited\/9732\/\" target=\"_blank\" rel=\"noopener\">g\u00fcvenli\u011fi garantilemez<\/a>.<\/p>\n<p>Sald\u0131rganlarlar son y\u0131llarda yeni yollar ke\u015ffetmeye ba\u015flad\u0131. Modern casus yaz\u0131l\u0131mlar ise bir\u00e7ok geli\u015fmi\u015f \u00f6zelli\u011fe sahip. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, t\u00fcrlerine g\u00f6re uygulama bildirimlerini, metin mesajlar\u0131n\u0131, PIN kodlar\u0131n\u0131 ve ekran kilitleme desenlerini g\u00f6rebilir; Google Kimlik Do\u011frulay\u0131c\u0131 ve benzeri uygulamalardan iki fakt\u00f6rl\u00fc kimlik do\u011frulama kodlar\u0131n\u0131 \u00e7alabilir ve kurban\u0131n ekran\u0131nda olanlar\u0131 ger\u00e7ek zamanl\u0131 olarak payla\u015fabilirler.<\/p>\n<p>Uygulama pencerelerinin \u00fcst\u00fcnde kendi uygulamalar\u0131n\u0131 g\u00f6r\u00fcnt\u00fcleyebilen k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar da vard\u0131r. Bu t\u00fcr yaz\u0131l\u0131mlar, \u00e7\u00f6z\u00fcm\u00fcn\u00fcz\u00fcn aray\u00fcz\u00fcn\u00fc kopyalayarak kimlik bilgilerini \u00e7almak i\u00e7in sahte oturum a\u00e7ma alanlar\u0131 ekleyebilirler.<\/p>\n<h2>2. Bilinmeyen Wi-Fi a\u011flar\u0131<\/h2>\n<p>Kullan\u0131c\u0131lar\u0131n hangi a\u011flara ba\u011flanaca\u011f\u0131n\u0131 bilemezsiniz. Bug\u00fcnlerde neredeyse her kafe ve her ula\u015f\u0131m arac\u0131 kendi Wi-Fi a\u011f\u0131n\u0131 herkese a\u00e7\u0131yor. Ayn\u0131 a\u011fda bulunan herkes, uygulaman\u0131zla sunucu aras\u0131ndaki veri al\u0131\u015fveri\u015fine s\u0131zmaya \u00e7al\u0131\u015fabilir ve m\u00fc\u015fterinin hesab\u0131na eri\u015fim elde edebilir. Siber su\u00e7lular bazen kendi kablosuz a\u011flar\u0131n\u0131 kurarak kullan\u0131c\u0131lar\u0131 tuza\u011fa d\u00fc\u015f\u00fcrmek i\u00e7in bu a\u011flar\u0131 bilerek a\u00e7\u0131k da b\u0131rakabilirler.<\/p>\n<h2>3. Uzaktan eri\u015fim ara\u00e7lar\u0131<\/h2>\n<p>Kullan\u0131c\u0131lar\u0131n cihazlar\u0131n\u0131n kontrol\u00fcn\u00fc tamamen ele ge\u00e7irmeye y\u00f6nelik ayr\u0131 bir program s\u0131n\u0131f\u0131 vard\u0131r. RAT\u2019lar\u0131n, yani Uzaktan Eri\u015fim Ara\u00e7lar\u0131n\u0131n hepsi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar de\u011fildir; baz\u0131lar\u0131 yasal uygulamalar\u0131n i\u00e7inde de bulunabilir. Ancak bunlar\u0131n sa\u011flad\u0131\u011f\u0131 eri\u015fim de siber su\u00e7lular\u0131n cihazlara uzaktan ba\u011flanmas\u0131n\u0131, g\u00fcvenlik ayarlar\u0131n\u0131 de\u011fi\u015ftirebilmelerini, cihazdaki herhangi bir bilgiyi okuyabilmelerini, hatta sizinki gibi bir uygulamay\u0131 kullanabilmelerini sa\u011flayabilir.<\/p>\n<h2>4. Taray\u0131c\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131<\/h2>\n<p>Mobil uygulamalar, birka\u00e7 \u00f6zellik d\u0131\u015f\u0131nda \u00e7o\u011funlukla s\u0131radan bir internet taray\u0131c\u0131n\u0131n sahip oldu\u011fu unsurlar \u00fczerine kuruludur. Taray\u0131c\u0131 motorlar\u0131nda s\u00fcrekli g\u00fcvenlik a\u00e7\u0131klar\u0131 bulundu\u011fu d\u00fc\u015f\u00fcn\u00fcl\u00fcrse mobil uygulama geli\u015ftiriciler \u00e7\u00f6z\u00fcmlerini d\u00fczenli aral\u0131klarla g\u00fcncellemelidir. Siber su\u00e7lular, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ke\u015ffedilmesiyle d\u00fczeltilmesi aras\u0131ndaki bo\u015flukta, uygulaman\u0131zdaki taray\u0131c\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kullanarak sald\u0131r\u0131 ger\u00e7ekle\u015ftirmeyi deneyebilir.<\/p>\n<h2>5. Kimlik av\u0131<\/h2>\n<p>Siber su\u00e7lular aras\u0131nda e-posta, mesajla\u015fma uygulamalar\u0131 ve metin mesajlar\u0131 arac\u0131l\u0131\u011f\u0131yla k\u00f6t\u00fc ama\u00e7l\u0131 sitelere ba\u011flant\u0131lar g\u00f6nderen kimlik avc\u0131lar\u0131 da yer al\u0131r. Sald\u0131rganlar elbette her \u015firketin internetin sitesini taklit etmeye \u00e7al\u0131\u015fabilir. Ancak sizin kullan\u0131c\u0131lar\u0131n\u0131z\u0131 hedef al\u0131yorlarsa onlar\u0131 sizinkine benzeyen bir internet sitesine \u00e7ekmeye \u00e7al\u0131\u015fmalar\u0131 ya da sizin \u015firketinizden geliyormu\u015f gibi g\u00f6r\u00fcnen mesajlar g\u00f6ndermeleri, sizin \u015firketinizin itibar\u0131na zarar verir.<\/p>\n<h2>Kullan\u0131c\u0131lar\u0131n korunmas\u0131 sizi neden ilgilendiriyor ve bunu nas\u0131l sa\u011flayabilirsiniz?<\/h2>\n<p>\u015eeklen bakt\u0131\u011f\u0131n\u0131zda, sayd\u0131\u011f\u0131m\u0131z tehditler son kullan\u0131c\u0131lara zarar veriyor, uygulamalar\u0131 sa\u011flayan \u015firketlere de\u011fil. En az\u0131ndan do\u011frudan\u2026 Ancak biraz daha derinine indi\u011finizde uygulama operat\u00f6r\u00fcn\u00fcn kay\u0131plar\u0131 da a\u00e7\u0131k\u00e7a ortaya \u00e7\u0131k\u0131yor. Ne de olsa, daha fazla siber olay, teknik deste\u011fe daha fazla y\u00fck demek. \u00dcstelik daha karma\u015f\u0131k olaylarda konu mahkemeye ta\u015f\u0131nabilir ve su\u00e7unuz ya da ihmaliniz olmasa da kendinizi savunmak bile ba\u015fl\u0131 ba\u015f\u0131na b\u00fcy\u00fck bir masraft\u0131r. Ayr\u0131ca, hakl\u0131 oldu\u011funuzu kan\u0131tlasan\u0131z bile en iyi ihtimalle bir, daha k\u00f6t\u00fc ihtimalle bir\u00e7ok m\u00fc\u015fteri kaybedersiniz: Bu sosyal medya \u00e7a\u011f\u0131nda tek bir olay bile h\u0131zla yay\u0131larak \u015firketin itibar\u0131na ciddi zararlar verebilir. Tedbiri elden b\u0131rakmamak ve m\u00fc\u015fterilerinizin g\u00fcvenli\u011fini \u00f6nceden sa\u011flamak daha ak\u0131ll\u0131ca olur.<\/p>\n<p>\u00dcr\u00fcnlerimiz aras\u0131nda, t\u00fcm mobil uygulamalara g\u00fcvenlik \u00f6zellikleri ekleyen <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security-sdk?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Mobile Security SDK<\/a>, bir antivir\u00fcs motoru ve dosyalar\u0131n, internet sayfalar\u0131n\u0131n ve herkese a\u00e7\u0131k Wi-Fi a\u011flar\u0131n\u0131n itibar\u0131 hakk\u0131nda ger\u00e7ek zamanl\u0131 bilgiler i\u00e7eren Kaspersky bulut hizmetlerine eri\u015fime sahip teknolojiler yer al\u0131yor. Kaspersky Mobile Security SDK hakk\u0131nda daha fazla bilgiye <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security-sdk?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">\u00e7\u00f6z\u00fcm\u00fcn sayfas\u0131ndan<\/a> ula\u015fabilirsiniz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular uygulamalar\u0131n\u0131z\u0131 kullanan herkesi hedef alabilir; kullan\u0131c\u0131lar\u0131 g\u00fcvende tutmak da k\u0131smen size ba\u011fl\u0131.<\/p>\n","protected":false},"author":2694,"featured_media":10349,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[105,751,2511],"class_list":{"0":"post-10348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-android","10":"tag-mobil","11":"tag-uygulama-guvenligi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/protect-your-app\/10348\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protect-your-app\/23718\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protect-your-app\/19218\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protect-your-app\/25868\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protect-your-app\/23911\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/protect-your-app\/23538\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/protect-your-app\/26553\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/protect-your-app\/26140\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/protect-your-app\/32045\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protect-your-app\/43090\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/protect-your-app\/18246\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/protect-your-app\/18628\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/protect-your-app\/15604\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/protect-your-app\/27845\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/protect-your-app\/27913\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/protect-your-app\/24666\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protect-your-app\/30081\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protect-your-app\/29872\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/uygulama-guvenligi\/","name":"uygulama g\u00fcvenli\u011fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2694"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10348"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10348\/revisions"}],"predecessor-version":[{"id":10351,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10348\/revisions\/10351"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10349"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}