{"id":1324,"date":"2014-08-15T11:07:24","date_gmt":"2014-08-15T15:07:24","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=1324"},"modified":"2019-11-15T15:07:18","modified_gmt":"2019-11-15T12:07:18","slug":"android-cihazlari-icin-ucretsiz-virus-taramasi","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/android-cihazlari-icin-ucretsiz-virus-taramasi\/1324\/","title":{"rendered":"Android Cihazlar\u0131 \u0130\u00e7in \u00dccretsiz Vir\u00fcs Taramas\u0131"},"content":{"rendered":"<p>Kullan\u0131c\u0131lar\u0131, yak\u0131n zamanda ke\u015ffedilen \u00e7ok say\u0131da Android g\u00fcvenlik a\u00e7\u0131\u011f\u0131na kar\u015f\u0131 korumak amac\u0131yla Kaspersky Lab, platform i\u00e7in \u00fccretsiz bir mobil uygulamas\u0131n\u0131 piyasaya s\u00fcrd\u00fc. Kaspersky Fake ID Scanner kullan\u0131c\u0131n\u0131n \u00f6nemli bilgilerini, gizlili\u011fini ve hatta paras\u0131n\u0131 riske atan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 bulmak i\u00e7in ak\u0131ll\u0131 telefonlar\u0131 ve tableti tar\u0131yor.<\/p>\n<p>G\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalan\u0131lmas\u0131n\u0131 \u00f6nlemek i\u00e7in Kaspersky Lab, Android cihaz sahiplerinin cihazlar\u0131n\u0131 t\u00fcm bu g\u00fcvenlik a\u00e7\u0131klar\u0131na kar\u015f\u0131 taramalar\u0131na ve cihazlar\u0131nda bunlardan faydalanan herhangi bir uygulaman\u0131n y\u00fckl\u00fc olmad\u0131\u011f\u0131ndan emin olmalar\u0131na olanak tan\u0131yan <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.kaspersky.lightscanner\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky \u00dccretsiz Fake<\/a> ID Scanner uygulamas\u0131n\u0131 geli\u015ftirdi. Bu uygulama alg\u0131lanan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatmaz ancak bir tehdit alg\u0131land\u0131\u011f\u0131 takdirde kullan\u0131c\u0131y\u0131, Kaspersky Internet Security for Android\u2019in \u00fccretsiz s\u00fcr\u00fcm\u00fcn\u00fc y\u00fcklemesi i\u00e7in uyar\u0131r. Bu \u00fcr\u00fcn cihaz\u0131, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n zararl\u0131 yaz\u0131l\u0131mlar taraf\u0131ndan kullan\u0131l\u0131p kullan\u0131lmad\u0131\u011f\u0131ndan ba\u011f\u0131ms\u0131z olarak zararl\u0131 kodlara kar\u015f\u0131 koruyor.<\/p>\n<p>Ge\u00e7ti\u011fimiz aylarda yap\u0131lan g\u00fcvenlik a\u00e7\u0131klar\u0131 ke\u015fiflerinin say\u0131s\u0131 hi\u00e7 de az de\u011fil. Yeni g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n en \u00f6nemlilerinden biri de Bluebox Labs uzmanlar\u0131 taraf\u0131ndan ke\u015ffedilen, sald\u0131rganlar\u0131n zararl\u0131 yaz\u0131l\u0131mlar dahil her uygulamay\u0131 tan\u0131nan tedarik\u00e7iler taraf\u0131ndan geli\u015ftirilmi\u015f yasal programlar olarak gizlemelerine olanak tan\u0131yan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 oldu. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131na Sahte Kimlik (Fake ID) ad\u0131 verildi.<\/p>\n<p>Bir di\u011fer dikkat \u00e7eken g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da Heartbleed oldu. OpenSSL protokol\u00fcn\u00fcn belirli s\u00fcr\u00fcmlerini kullanan sistemlerin belle\u011fini okumak i\u00e7in kullan\u0131l\u0131yor. Bu \u015fekilde sald\u0131rganlar, \u00f6zel olarak tasarlad\u0131klar\u0131 talepler g\u00f6ndererek kullan\u0131c\u0131n\u0131n hassas bilgilerine eri\u015fim sa\u011flayabiliyor. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 Google dahil bir\u00e7ok \u015firketi etkiledi.<\/p>\n<p>En yeni ke\u015fiflerden biri olan Master Key g\u00fcvenlik a\u00e7\u0131\u011f\u0131 siber su\u00e7lular\u0131n herhangi bir Android cihaz\u0131na y\u00f6netici \u00f6ncelikleriyle eri\u015fim sa\u011flamas\u0131na olanak tan\u0131yor. B\u00f6ylece sald\u0131rganlar cihaz \u00fczerinde herhangi bir yaz\u0131l\u0131m\u0131, kullan\u0131c\u0131n\u0131n bilgisi d\u0131\u015f\u0131nda ba\u015flatabiliyor.<\/p>\n<p>Her ne kadar Google bu tip g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 genellikle h\u0131zl\u0131 bir \u015fekilde kapat\u0131yor olsa da cihaz \u00fcreticilerinin bellenimleri g\u00fcncellemesi uzun zaman ald\u0131\u011f\u0131nda milyonlarca Android kullan\u0131c\u0131s\u0131 risk alt\u0131nda kal\u0131yor. Zararl\u0131 yaz\u0131l\u0131m, ak\u0131ll\u0131 telefonlar ve tabletlere giden yolu a\u00e7mak i\u00e7in pop\u00fcler uygulamalar\u0131n k\u0131l\u0131\u011f\u0131na girerek bu g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalanabilir ve cihazlarda depolanan ki\u015fisel bilgileri \u00e7alabilir, sosyal a\u011flardaki kullan\u0131c\u0131 hesaplar\u0131n\u0131 ele ge\u00e7irebilir veya \u00e7evrimi\u00e7i bankac\u0131l\u0131k bilgilerini \u00e7alabilir.<\/p>\n<p>Android 2.3 ve sonraki s\u00fcr\u00fcmlerle uyumlu olan Kaspersky \u00dccretsiz Fake ID Scanner, Google Play\u2019den \u0130ngilizce ve Rus\u00e7a olarak iki farkl\u0131 dilde sat\u0131n al\u0131nabilir.<\/p>\n<p>\u00dccretsiz indirmek i\u00e7in: <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.kaspersky.lightscanner\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/play.google.com\/store\/apps\/details?id=com.kaspersky.lightscanner<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kullan\u0131c\u0131lar\u0131, yak\u0131n zamanda ke\u015ffedilen \u00e7ok say\u0131da Android g\u00fcvenlik a\u00e7\u0131\u011f\u0131na kar\u015f\u0131 korumak amac\u0131yla Kaspersky Lab, platform i\u00e7in \u00fccretsiz bir mobil uygulamas\u0131n\u0131 piyasaya s\u00fcrd\u00fc. Kaspersky Fake ID Scanner kullan\u0131c\u0131n\u0131n \u00f6nemli bilgilerini, gizlili\u011fini<\/p>\n","protected":false},"author":350,"featured_media":1326,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351,1285],"tags":[105,623,622],"class_list":{"0":"post-1324","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"category-products","10":"tag-android","11":"tag-ucretsiz","12":"tag-virus-tarama"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/android-cihazlari-icin-ucretsiz-virus-taramasi\/1324\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=1324"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1324\/revisions"}],"predecessor-version":[{"id":7294,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/1324\/revisions\/7294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/1326"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=1324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=1324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=1324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}