{"id":11817,"date":"2023-11-06T10:00:27","date_gmt":"2023-11-06T07:00:27","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11817"},"modified":"2023-11-02T19:48:55","modified_gmt":"2023-11-02T16:48:55","slug":"android-most-dangerous-features","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/android-most-dangerous-features\/11817\/","title":{"rendered":"En tehlikeli 3 Android \u00f6zelli\u011fi"},"content":{"rendered":"<p>Android, her yeni s\u00fcr\u00fcmde daha iyi ve daha g\u00fcvenli hale gelen, iyi tasarlanm\u0131\u015f bir i\u015fletim sistemidir. Ancak ak\u0131ll\u0131 telefonunuzu veya tabletinizi ciddi enfeksiyon riskine sokabilecek \u00e7e\u015fitli \u00f6zellikler vard\u0131r. Bug\u00fcn, bunlar\u0131n aras\u0131ndaki en tehlikeli olan \u00fc\u00e7\u00fcne ve bunlar\u0131 kullan\u0131rken riskleri nas\u0131l en aza indirebilece\u011fimize bir g\u00f6z ataca\u011f\u0131z.<\/p>\n<h2>Eri\u015fim<\/h2>\n<p>Eri\u015filebilirlik, as\u0131l olarak ciddi g\u00f6rme bozuklu\u011fu olan ki\u015filer i\u00e7in tasarlanm\u0131\u015f son derece g\u00fc\u00e7l\u00fc bir Android \u00f6zellikleri setidir. Ak\u0131ll\u0131 telefonlar\u0131 kullanmak i\u00e7in ekrandaki metni y\u00fcksek sesle okuyan, sesli komutlara yan\u0131t veren ve bunlar\u0131 kullan\u0131c\u0131 aray\u00fcz\u00fc kontrollerindeki \u00e7\u0131kt\u0131lara d\u00f6n\u00fc\u015ft\u00fcren \u00f6zel uygulamalara ihtiya\u00e7lar\u0131 vard\u0131r.<\/p>\n<p>G\u00f6rme bozuklu\u011fu olanlar i\u00e7in bu i\u015flev yaln\u0131zca yararl\u0131 de\u011fil, ayn\u0131 zamanda gereklidir. Ancak Eri\u015filebilirli\u011fin i\u015fleyi\u015f \u015fekli, bir uygulaman\u0131n di\u011ferlerinde olup biten her \u015feye eri\u015fmesine izin vermektir. Bu, Android\u2019in temel g\u00fcvenlik \u00f6zelli\u011fi olan kat\u0131 izolasyon ilkesini ihlal etmektedir.<\/p>\n<p>Bunlar sadece Eri\u015filebilirlik \u00f6zelli\u011finden yararlanan g\u00f6rme engellilere yard\u0131m etmeye y\u00f6nelik ara\u00e7lar de\u011fildir. \u00d6rne\u011fin, mobil antivir\u00fcsler bunu genellikle di\u011fer uygulamalarda meydana gelen \u015f\u00fcpheli durumlara kar\u015f\u0131 tetikte olmak i\u00e7in kullan\u0131r.<\/p>\n<p>Ancak her madalyonun bir de di\u011fer y\u00fcz\u00fc vard\u0131r. \u00d6rne\u011fin k\u00f6t\u00fc ama\u00e7l\u0131 uygulamalar da bu \u00f6zellik setine eri\u015fim izni isteyebilir. Bu \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fil, \u00e7\u00fcnk\u00fc bu t\u00fcr bir eri\u015fim ak\u0131ll\u0131 telefonunuzdaki her \u015feyi g\u00f6zetlemeyi kolayla\u015ft\u0131r\u0131r: mesajlar\u0131 okumak, kimlik bilgilerini ve finansal verileri \u00e7almak, tek seferlik i\u015flem onay kodlar\u0131na m\u00fcdahale etmek vb.<\/p>\n<p>Dahas\u0131, bu \u00f6zelli\u011fe eri\u015fim, siber su\u00e7lular\u0131n ak\u0131ll\u0131 telefonda d\u00fc\u011fmelere dokunma ve form doldurma gibi kullan\u0131c\u0131 i\u015flemlerini ger\u00e7ekle\u015ftirmesine olanak tan\u0131yor. \u00d6rne\u011fin, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tek ba\u015f\u0131na bir bankac\u0131l\u0131k uygulamas\u0131ndaki transfer formunu doldurup k\u0131sa mesajdaki tek seferlik kodla onaylayabilir.<\/p>\n<p>Bu nedenle, bir uygulamaya Eri\u015filebilirlik eri\u015fimi vermeden \u00f6nce her zaman dikkatlice d\u00fc\u015f\u00fcn\u00fcn: Geli\u015ftiricilerine ger\u00e7ekten g\u00fcveniyor musunuz?<\/p>\n<h2>Bilinmeyen uygulamalar\u0131 y\u00fckleme<\/h2>\n<p>Varsay\u0131lan olarak, yaln\u0131zca resmi ma\u011faza uygulamas\u0131n\u0131n Android\u2019e di\u011fer programlar\u0131 y\u00fckleme hakk\u0131 vard\u0131r. Sistemin de\u011fi\u015ftirilmemi\u015f bir s\u00fcr\u00fcm\u00fc g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, bu elbette Google Play\u2019dir. Ancak ak\u0131ll\u0131 telefon geli\u015ftiricileri Google Play ile birlikte (veya onun yerine ge\u00e7en ba\u015fka bir ma\u011faza) genellikle Huawei AppGallery veya Samsung Galaxy Store gibi kendi uygulamalar\u0131n\u0131 kullan\u0131yor. Asl\u0131nda Android, uygulama indirme kaynaklar\u0131nda kat\u0131 s\u0131n\u0131rlamalar\u0131n bulunmad\u0131\u011f\u0131 demokratik bir i\u015fletim sistemidir. <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/unknown-apps-android\/10015\/\" rel=\"noopener\">Herhangi bir uygulaman\u0131n herhangi bir yerden program indirip y\u00fcklemesine kolayca izin verebilirsiniz<\/a>. Ancak ak\u0131ll\u0131 telefonunuza bu \u015fekilde k\u00f6t\u00fc bir \u015feyin bula\u015fmas\u0131 da ayn\u0131 derecede kolayd\u0131r, bu y\u00fczden bunu kullanman\u0131z\u0131 \u00f6nermiyoruz.<\/p>\n<p>Resmi ma\u011fazalar genellikle uygulama indirmek i\u00e7in en g\u00fcvenli kaynaklard\u0131r. Uygulamalar resmi ma\u011fazada yay\u0131nlanmadan \u00f6nce g\u00fcvenlik kontrollerine tabi tutulur. Daha sonra k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n gizlice i\u00e7eri s\u0131zd\u0131\u011f\u0131 ortaya \u00e7\u0131karsa, tehlikeli uygulama h\u0131zla ma\u011fazadan d\u0131\u015far\u0131 al\u0131n\u0131r.<\/p>\n<p>Elbette, Google Play bile k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 tamamen ba\u011f\u0131\u015f\u0131k de\u011fil (ne yaz\u0131k ki, istedi\u011fimizden daha s\u0131k giriyor). Yine de, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n yayg\u0131n oldu\u011fu ve sahiplerinin umursamad\u0131\u011f\u0131 \u00fc\u00e7\u00fcnc\u00fc taraf sitelerin aksine, resmi ma\u011fazalar en az\u0131ndan evlerini d\u00fczenli tutmaya \u00e7al\u0131\u015f\u0131yor. Bu duruma bir \u00f6rnek: <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/infected-apkpure\/9515\/\" rel=\"noopener\">Sald\u0131rganlar bir zamanlar \u00fc\u00e7\u00fcnc\u00fc taraf Android uygulama ma\u011fazas\u0131na da vir\u00fcs bula\u015ft\u0131rmay\u0131 ba\u015farm\u0131\u015flard\u0131<\/a>.<\/p>\n<p>Hat\u0131rlanmas\u0131 gereken en \u00f6nemli \u015fey \u015fudur: kesinlikle resmi uygulama ma\u011fazas\u0131ndan olmamak \u00fczere Android ak\u0131ll\u0131 telefonunuza bir \u015fey indirip y\u00fcklemeniz gerekti\u011fine karar verirseniz, kurulumdan hemen sonra bunu yapma \u00f6zelli\u011fini devre d\u0131\u015f\u0131 b\u0131rakmay\u0131 unutmay\u0131n. Hi\u00e7bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n ortaya \u00e7\u0131kmad\u0131\u011f\u0131ndan emin olmak i\u00e7in cihaz\u0131n\u0131z\u0131 daha sonra mobil bir antivir\u00fcs ile taramak da iyi bir fikirdir; bizim \u00fccretsiz s\u00fcr\u00fcm\u00fcm\u00fcz [placeholder KISA 2023] bu i\u015fi gayet iyi yapacakt\u0131r.<\/p>\n<h2>S\u00fcper kullan\u0131c\u0131 haklar\u0131 (k\u00f6klendirme)<\/h2>\n<p>Yukar\u0131daki iki \u00f6zellikten daha az pop\u00fcler olan, ancak hi\u00e7bir \u015fekilde daha az tehlikeli olmayan \u00f6zellik, Android\u2019de s\u00fcper kullan\u0131c\u0131 haklar\u0131 kazanma kabiliyetidir. Bu i\u015flem genellikle \u201ck\u00f6klendirme\u201d olarak bilinir (\u201ck\u00f6k\u201d, Linux\u2019te s\u00fcper kullan\u0131c\u0131 hesab\u0131na verilen add\u0131r).<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-root-faq\/3388\/\" rel=\"noopener\">S\u00fcper kullan\u0131c\u0131 haklar\u0131, bunlar\u0131 cihaza alan herkese s\u00fcper g\u00fc\u00e7ler verdi\u011fi<\/a> i\u00e7in bu atama uygundur. Kullan\u0131c\u0131 i\u00e7in Android\u2019in genellikle yasak olan derinliklerini a\u00e7arlar. S\u00fcper kullan\u0131c\u0131 haklar\u0131, dosya sistemine, a\u011f trafi\u011fine, ak\u0131ll\u0131 telefon donan\u0131m\u0131na, herhangi bir \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131n kurulumuna ve \u00e7ok daha fazlas\u0131na tam eri\u015fim sa\u011flar.<\/p>\n<p>Yine de, bir dezavantaj\u0131 var: K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m k\u00f6k eri\u015fimli bir ak\u0131ll\u0131 telefona bula\u015f\u0131rsa, o da s\u00fcper g\u00fc\u00e7ler kazan\u0131r. Bu nedenle k\u00f6klendirme, bir\u00e7ok devlet istihbarat te\u015fkilat\u0131 taraf\u0131ndan kullan\u0131lan <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-from-pegasus-spyware\/10492\/\" rel=\"noopener\">geli\u015fmi\u015f casus yaz\u0131l\u0131m uygulamalar\u0131n\u0131n<\/a> ve bunlar\u0131n yan\u0131 s\u0131ra genel kullan\u0131c\u0131lar\u0131n eri\u015febildi\u011fi son teknoloji takip <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/monitorminor-stalkerware\/7925\/\" rel=\"noopener\">yaz\u0131l\u0131mlar\u0131<\/a> i\u00e7in de tercih edilen bir y\u00f6ntemdir.<\/p>\n<p>Bu nedenle, i\u015fletim sisteminin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 net bir \u015fekilde anlayan bir uzman de\u011filseniz, Android ak\u0131ll\u0131 telefonunuza veya tabletinize k\u00f6klendirme yapman\u0131z\u0131 kesinlikle \u00f6nermiyoruz.<\/p>\n<h2>Android kullan\u0131c\u0131lar\u0131 nas\u0131l g\u00fcvende kalabilir<\/h2>\n<p>Son olarak, nas\u0131l g\u00fcvende kalaca\u011f\u0131n\u0131za dair birka\u00e7 ipucu:<\/p>\n<ul>\n<li>Eri\u015filebilirli\u011fe eri\u015fim isteyen uygulamalara kar\u015f\u0131 dikkatli olun.<\/li>\n<li>Uygulamalar\u0131 yaln\u0131zca resmi ma\u011fazalardan y\u00fcklemeye \u00e7al\u0131\u015f\u0131n. Evet, orada da k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla kar\u015f\u0131la\u015fabilirsiniz, ancak yine de g\u00fcvenlikten kimsenin sorumlu olmad\u0131\u011f\u0131 alternatif siteleri kullanmaktan \u00e7ok daha g\u00fcvenlidir.<\/li>\n<li>\u00dc\u00e7\u00fcnc\u00fc taraf bir kaynaktan uygulama y\u00fcklerseniz hemen ard\u0131ndan \u201cBilinmeyen uygulamalar\u0131 y\u00fckle\u201d se\u00e7ene\u011fini devre d\u0131\u015f\u0131 b\u0131rakmay\u0131 unutmay\u0131n.<\/li>\n<li>K\u00f6k izinlerinin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 tam olarak anlamad\u0131\u011f\u0131n\u0131z s\u00fcrece asla k\u00f6kl\u00fc Android kullanmay\u0131n.<\/li>\n<li>T\u00fcm Android cihazlar\u0131n\u0131zda <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir koruma<\/a> y\u00fckledi\u011finizden emin olun.<\/li>\n<li>G\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fcn \u00fccretsiz s\u00fcr\u00fcm\u00fcn\u00fc kullan\u0131yorsan\u0131z, zaman zaman manuel olarak tarama yapmay\u0131 unutmay\u0131n. \u00dccretli s\u00fcr\u00fcm\u00fcnde <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>, tarama otomatik olarak ger\u00e7ekle\u015fir.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-2\">\n","protected":false},"excerpt":{"rendered":"<p>Ak\u0131ll\u0131 telefonunuzu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 \u00e7ok daha savunmas\u0131z hale getiren en tehlikeli \u00fc\u00e7 Android \u00f6zelli\u011fi.<\/p>\n","protected":false},"author":2726,"featured_media":11818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[555,105,881,1900,744,519,1754,665,537,1986,1130],"class_list":{"0":"post-11817","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-akilli-telefonlar","10":"tag-android","11":"tag-ayarlar","12":"tag-casus-yazilim","13":"tag-guvenlik","14":"tag-ipuclari-2","15":"tag-kok","16":"tag-mobil-cihazlar","17":"tag-tehditler","18":"tag-truva-atlari","19":"tag-uygulama-izinleri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/android-most-dangerous-features\/11817\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/android-most-dangerous-features\/26544\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/android-most-dangerous-features\/21971\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/android-most-dangerous-features\/11142\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/android-most-dangerous-features\/29240\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/android-most-dangerous-features\/26817\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/android-most-dangerous-features\/26801\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/android-most-dangerous-features\/29287\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/android-most-dangerous-features\/28159\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/android-most-dangerous-features\/36455\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/android-most-dangerous-features\/49418\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/android-most-dangerous-features\/21146\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/android-most-dangerous-features\/21950\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/android-most-dangerous-features\/30628\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/android-most-dangerous-features\/35060\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/android-most-dangerous-features\/28917\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/android-most-dangerous-features\/27109\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/android-most-dangerous-features\/32823\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/android-most-dangerous-features\/32471\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11817"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11817\/revisions"}],"predecessor-version":[{"id":11820,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11817\/revisions\/11820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11818"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}