{"id":2208,"date":"2016-06-21T03:47:51","date_gmt":"2016-06-21T07:47:51","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=2208"},"modified":"2019-11-15T15:00:21","modified_gmt":"2019-11-15T12:00:21","slug":"vulnerable-medical-equipment","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerable-medical-equipment\/2208\/","title":{"rendered":"Hasta olmak iki kat tehlikeli: Medikal ekipmanlar hackerlara kar\u015f\u0131 korumas\u0131z"},"content":{"rendered":"<p><strong>Hemen hemen b\u00fct\u00fcn siber sald\u0131r\u0131lar\u0131n amac\u0131 ayn\u0131d\u0131r \u2013 birilerinin paras\u0131n\u0131 \u00e7almak.<\/strong> Cihazlar\u0131n say\u0131s\u0131 ve \u00e7e\u015fitlili\u011fi her ge\u00e7en g\u00fcn art\u0131yor ama k\u00f6t\u00fc olan da \u015fu, yaz\u0131l\u0131m hatas\u0131 olan bir cihaz para kayb\u0131ndan \u00e7ok daha ciddi sonu\u00e7lara sebep olabilir.<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/blackhat-jeep-cherokee-hack-explained\/9493\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u0130nternete ba\u011flanabilen bir ara\u00e7<\/a> mesela, bir cihaz\u0131n insan hayat\u0131 i\u00e7in ne kadar riskli olabilece\u011fine dair harika bir \u00f6rnek. Otomatik pilotlu bir araca bula\u015fan bir vir\u00fcs rahatl\u0131kla arac\u0131n kaza yapmas\u0131n\u0131 sa\u011flayabilir. Ak\u0131ll\u0131 medikal ekipmanlar da risk alt\u0131nda. Bizi sa\u011fl\u0131kl\u0131 tutmas\u0131 i\u00e7in yap\u0131lm\u0131\u015f cihazlar, tam tersini de yapabilirler.<\/p>\n<p>G\u00fcncel olarak, insanlara direkt olarak zarar vermi\u015f medikal ekipman say\u0131s\u0131 s\u0131f\u0131r. Buna ra\u011fmen yetkililer d\u00fczenli olarak yeni cihazlarda insanlara fiziksel zararlar verebilecek farkl\u0131 yaz\u0131l\u0131m hatalar\u0131 buluyor.<\/p>\n<p>\u00c7\u00fcnk\u00fc para \u00e7almak ve insanlara fiziksel olarak zarar vermek tamamen farkl\u0131 \u015feyler, fiziksel olarak zarar vermeme sebepleri bunu etik bulmamalar\u0131 olabilir. Ama daha b\u00fcy\u00fck bir ihtimal, medikal cihazlar\u0131 hackleyerek nas\u0131l k\u0131sa yoldan kazan\u00e7 elde edebileceklerini bilmiyorlar (hen\u00fcz).<\/p>\n<p>Asl\u0131nda, siber su\u00e7lular hastanelere trojanlarla ve di\u011fer bilinen zararl\u0131 yaz\u0131l\u0131mlarla zaten sald\u0131r\u0131yor. \u00d6rne\u011fi, bu y\u0131l\u0131n ba\u015flar\u0131nda Amerika\u2019da bir\u00e7ok medikal merkez ki Los Angeles\u2019ta bulunan Hollywood Presbiteryen Medikal Merkez\u2019i de <a href=\"https:\/\/www.kaspersky.com\/blog\/locky-ransomware\/11667\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">dahil<\/a>, fidye vir\u00fcs\u00fcnden etkilendi.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"tr\" dir=\"ltr\">Fidyenin \u00f6dememesi gerekti\u011fini k\u00f6t\u00fc \u015fekilde \u00f6\u011frenen hastane <a href=\"https:\/\/t.co\/GS7V4f91uF\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/GS7V4f91uF<\/a> <a href=\"https:\/\/t.co\/ItTg6Q90dc\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/ItTg6Q90dc<\/a><\/p>\n<p>\u2014 Kaspersky T\u00fcrkiye (@KasperskyTR) <a href=\"https:\/\/twitter.com\/KasperskyTR\/status\/739796786081103872?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 6, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Los Angeles\u2019ta bulunan hastane kay\u0131tlar\u0131n\u0131 geri alabilmek i\u00e7in 17.00$ \u00f6dedi. Kansas Kalp Hastanesi\u2019de ayn\u0131s\u0131n\u0131 denedi fakat dosyalar\u0131n\u0131 geri alamad\u0131\u011f\u0131 gibi, su\u00e7lular daha \u00e7ok para <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/why-you-dont-pay-ransomware\/2156\/\" target=\"_blank\" rel=\"noopener noreferrer\">talep etti<\/a>. G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, siber su\u00e7lular yapt\u0131klar\u0131 i\u015flerin etik olup olmad\u0131\u011f\u0131na pek bakm\u0131yor: baz\u0131lar\u0131 hastanelere sald\u0131r\u0131p kolay para kazanmaktan mutlu olabiliyor.<\/p>\n<p>Medikal ekipmanlar ara\u015ft\u0131rma ve sertifika gerektirir \u2013 fakat sadece medikal ekipmanlar, bilgisayar teknolojisine ba\u011flanabilenler de\u011fil. Bu y\u00fczden tatmin edici \u015fekilde siber g\u00fcvenlik konusunda gereksinimleri kar\u015f\u0131lanmal\u0131, ama bu da tamamen sat\u0131c\u0131n\u0131n sa\u011fduyusuna kalm\u0131\u015f bir durum. Sonu\u00e7 olarak bir\u00e7ok hastane ekipman\u0131 yaz\u0131l\u0131m a\u00e7\u0131klar\u0131na sahip, bu da BT uzmanlar\u0131 taraf\u0131ndan uzun zamand\u0131r bilinen bir durum.<\/p>\n<p><a href=\"https:\/\/tr.wikipedia.org\/wiki\/FDA\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Amerikan G\u0131da ve \u0130la\u00e7 Dairesi (FDA)<\/a>, medikal ekipmanlar\u0131n sat\u0131\u015flar\u0131n\u0131 ve sertifika i\u015flerini d\u00fczenliyor. Geli\u015fen ba\u011flan\u0131labilir \u00e7evreye uygun olmas\u0131 ad\u0131na, FDA \u00fcreticilerin ve sa\u011fl\u0131k\u00e7\u0131lar\u0131n medikal cihazlar\u0131 daha g\u00fcvenli tutabilmesi i\u00e7in y\u00f6netmelik yay\u0131nlad\u0131. 2016\u2019n\u0131n ba\u015flar\u0131nda, bunun benzeri bir belge yay\u0131nlanm\u0131\u015ft\u0131. Fakat belgenin b\u00fct\u00fcn i\u00e7eri\u011fi sadece \u00f6nerilerden olu\u015fuyordu. Yani medikal cihazlar\u0131n siber tehditlere kar\u015f\u0131 g\u00fcvenli\u011fini sa\u011flamak hala insanlar\u0131n hayat\u0131n\u0131 tehlikeye atacak <strong>hayati bir durum de\u011fil<\/strong>.<\/p>\n<p><strong>\u00d6l\u00fcmc\u00fcl ihmal<\/strong><br>\nEkipman \u00fcreticileri, siber g\u00fcvenlik uzmanlar\u0131ndan yard\u0131m isteyebilir, ama genelde tam tersini yap\u0131yorlar. Cihazlar\u0131n g\u00fcvenlik testine girmesine bile kar\u015f\u0131 \u00e7\u0131k\u0131yorlar. Uzmanlar, bu cihazlar\u0131n g\u00fcvenliklerini denemek i\u00e7in ikinci el medikal ekipman almak zorunda kal\u0131yorlar. \u00d6rne\u011fin, <a href=\"https:\/\/twitter.com\/XSSniper\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Billy Rios<\/a> bile \u2013 ki Billy <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things\/7667\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ba\u011flan\u0131labilir cihazlar\u0131n i\u00e7ini d\u0131\u015f\u0131n\u0131 bilir<\/a>, medikal cihazlar\u0131 arada s\u0131rada inceleyebiliyor.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Medicine under fire: how to hack a hospital <a href=\"https:\/\/t.co\/QcmY3IlWGR\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/QcmY3IlWGR<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TheSAS2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TheSAS2016<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Healthcare?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Healthcare<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/medicalsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#medicalsec<\/a> <a href=\"https:\/\/t.co\/Cil0ueabag\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Cil0ueabag<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/697813032647467008?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Yakla\u015f\u0131k iki y\u0131l \u00f6nce, Rios Hospira\u2019n\u0131n d\u00fcnya \u00e7evresinde onbinlerce hastanede kullan\u0131lan <a href=\"https:\/\/en.wikipedia.org\/wiki\/Infusion_pump\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">inf\u00fczyon pompalar\u0131n\u0131<\/a> test etti. Sonu\u00e7lar \u00fcrk\u00fct\u00fcc\u00fcyd\u00fc: \u0130la\u00e7 enjekte pompalar\u0131na eri\u015fim sa\u011flad\u0131, verilen dozaj\u0131 artt\u0131rma ve azaltma ayarlar\u0131n\u0131 <a href=\"https:\/\/www.kaspersky.com\/blog\/drug-pump-security-bugs\/8650\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">de\u011fi\u015ftirebildi<\/a>. Sonu\u00e7 olarak, k\u00f6t\u00fc biri buraya eri\u015febilirse, ba\u011fl\u0131 olan hastaya istedi\u011fi dozda ilac\u0131 enjekte edebilir. \u0130ronik olarak, bu cihazlar\u0131n reklamlar\u0131, \u00fcr\u00fcnlerin \u2018hatas\u0131z\u2019 oldu\u011funu savunuyor.<\/p>\n<p>Rios\u2019un buldu\u011fu di\u011fer bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, CareFusion firmas\u0131n\u0131n Pyxis SupplyStation Sistemi\u2019ydi. 2014\u2019te Rios herkesin sisteme girebilece\u011fi bir a\u00e7\u0131k ke\u015ffetti.<br>\n2016\u2019da Rios, arkada\u015f\u0131 g\u00fcvenlik uzman\u0131 Mike Ahmadi ile Pyxis SupplyStation sistemini tekrar denedi. Bu ikili <a href=\"https:\/\/threatpost.com\/1400-vulnerabilities-to-remain-unpatched-in-medical-supply-system\/117089\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">1.400\u2019den fazla sistemsel a\u00e7\u0131k ke\u015ffetti<\/a>, yar\u0131s\u0131n\u0131n \u00e7ok tehlikeli oldu\u011funu belirtti. \u00dc\u00e7\u00fcnc\u00fc parti geli\u015ftiricilerin Pyxis\u2019in ikinci geli\u015ftirilmi\u015f versiyonunda buldu\u011fu bunca a\u00e7\u0131\u011fa ra\u011fmen, bu a\u00e7\u0131klar hala giderilmi\u015f de\u011fil.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Hasta olmak iki kat tehlikeli: Medikal ekipmanlar hackerlara kar\u015f\u0131 korumas\u0131z<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fd2RX&amp;text=Hasta+olmak+iki+kat+tehlikeli%3A+Medikal+ekipmanlar+hackerlara+kar%C5%9F%C4%B1+korumas%C4%B1z+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Bu a\u00e7\u0131klar\u0131n \u00e7\u00f6z\u00fcmlerinin hayati \u00f6nem ta\u015f\u0131mas\u0131na ra\u011fmen, geli\u015ftiriciler a\u00e7\u0131klar\u0131 gidermek i\u00e7in hi\u00e7bir yama yapmad\u0131lar. Bunun yerine CareFusion m\u00fc\u015fterilerine ekipmanlar\u0131n\u0131 g\u00fcncellemesini \u00f6nerdi. Ancak m\u00fc\u015fteriler, kendilerine \u2018riskleri minimalize etmek i\u00e7in\u2019 da\u011f\u0131t\u0131lan ipu\u00e7lar\u0131 listesi ile u\u011fra\u015fmak istemedi.<\/p>\n<p>Eski bir ekipman\u0131 g\u00fcncellemek zor ve pahall\u0131 bir i\u015flem. Ama \u00f6rne\u011fin, Microsoft cihazlarda y\u00fckl\u00fc bulunan i\u015fletim sistemlerini oldu\u011fu gibi b\u0131rakabiliyor, teknik destek ve g\u00fcncelle\u015ftirme hizmeti sunmuyor. Dolay\u0131s\u0131yla b\u00fct\u00fcn bir i\u015fletim sistemini korunmas\u0131z b\u0131rakabiliyor. Pyxis SupplyStation\u2019\u0131n son versiyonu Windows 7\u2019de ve daha g\u00fcncellerinde \u00e7al\u0131\u015f\u0131yor.<\/p>\n<p>Kaspersky Lab olarak hastanelere de siber g\u00fcvenlik testi <a href=\"https:\/\/www.kaspersky.com\/blog\/hacked-hospital\/11296\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">sa\u011fl\u0131yoruz<\/a>: G\u00fcvenlik uzman\u0131m\u0131z Sergey Lozhkin, i\u00e7erisinde <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Tomografi\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">tomografi cihaz\u0131n\u0131n<\/a> da bulundu\u011fu medikal ekipmanlar\u0131 deneyimleme ve hackleme i\u00e7in davet edildi. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How I hacked my <a href=\"https:\/\/twitter.com\/hashtag\/hospital?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#hospital<\/a> \u2013 <a href=\"https:\/\/t.co\/qhKfT636F5\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/qhKfT636F5<\/a> from <a href=\"https:\/\/twitter.com\/61ack1ynx?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@61ack1ynx<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/healthcare?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#healthcare<\/a> <a href=\"https:\/\/t.co\/SPES9tPnsw\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/SPES9tPnsw<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/697498654731534337?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 10, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Tabii, yukar\u0131da belirtilen durumlar uzmanlar taraf\u0131ndan \u2013 siber su\u00e7lular\u0131n isterlerse ne kadar kolayca sistemlere girebilece\u011fini g\u00f6stermek i\u00e7in \u2013 yerine getirildi ve hi\u00e7bir \u015feye zarar verilmedi!<\/p>\n<p><strong>Su\u00e7lu kim, ve ne yapabiliriz? <\/strong><br>\nMedikal cihazlar\u0131n servis \u00f6mr\u00fc, sizin cebinizdeki ak\u0131ll\u0131 telefonlar\u0131n hayat\u0131ndan \u00e7ok \u00e7ok daha uzun. Pahall\u0131 bir ekipman i\u00e7in d\u00fczinelerce y\u0131l pek uzun bir zaman de\u011fil. Dahas\u0131, en yeni cihazlar\u0131n eskilerine nazaran sistem zay\u0131fl\u0131klar\u0131 daha az. E\u011fer destek sa\u011flanmazsa bir s\u00fcre sonra onlar da eskileri gibi hata dolu olacaklar.<\/p>\n<p>Mike Ahmadi dedi\u011fi gibi: \u201dMedikal cihaz \u00fcreticileri i\u00e7in, medikal cihaz ve cihazlar\u0131n siber g\u00fcvenli\u011finin belirlenmi\u015f bir kullan\u0131m \u00f6mr\u00fcn\u00fcn  olmas\u0131n\u0131n makul oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyorum.\u201d<\/p>\n<p>Pyxis SupplyStation hackinin iyi bir taraf\u0131 da var. Do\u011fru, yap\u0131mc\u0131lar Rios\u2019un ke\u015ffetti\u011fi ilk buglar\u0131 g\u00f6rmezden geldi ama sonra devasa Becton Dickinson \u015firketi sat\u0131n ald\u0131 ve yeni y\u00f6netim, siber uzmanlara farkl\u0131 bir \u015feklinde yakla\u015ft\u0131. Gelecekte belki, \u015firketler bug bulmay\u0131 \u015fimdiden daha fazla dikkate al\u0131rlar. Ve belki de, yeni cihazlar\u0131 piyasaya s\u00fcrmeden evvel test <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hemen hemen b\u00fct\u00fcn siber sald\u0131r\u0131lar\u0131n amac\u0131 ayn\u0131d\u0131r \u2013 birilerinin paras\u0131n\u0131 \u00e7almak. Cihazlar\u0131n say\u0131s\u0131 ve \u00e7e\u015fitlili\u011fi her ge\u00e7en g\u00fcn art\u0131yor ama k\u00f6t\u00fc olan da \u015fu, yaz\u0131l\u0131m hatas\u0131 olan bir cihaz para<\/p>\n","protected":false},"author":1654,"featured_media":2209,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[591,874,876,777,875,344,43,287,97,794,877,553],"class_list":{"0":"post-2208","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-fidye-yazilimi","9":"tag-hastaneler","10":"tag-ilac","11":"tag-internet","12":"tag-medikal-ekipman","13":"tag-online-protection","14":"tag-privacy","15":"tag-safety","16":"tag-security-2","17":"tag-sifreleme","18":"tag-sistem-aciklari","19":"tag-zararli-yazilim-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/vulnerable-medical-equipment\/2208\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/vulnerable-medical-equipment\/5489\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/vulnerable-medical-equipment\/3857\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/vulnerable-medical-equipment\/7314\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/vulnerable-medical-equipment\/7342\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/vulnerable-medical-equipment\/7291\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/vulnerable-medical-equipment\/8507\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/vulnerable-medical-equipment\/8404\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/vulnerable-medical-equipment\/12252\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/vulnerable-medical-equipment\/12385\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/vulnerable-medical-equipment\/5770\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/vulnerable-medical-equipment\/6377\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/vulnerable-medical-equipment\/7961\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/vulnerable-medical-equipment\/11781\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/vulnerable-medical-equipment\/12252\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/vulnerable-medical-equipment\/12385\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/vulnerable-medical-equipment\/12385\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/1654"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=2208"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2208\/revisions"}],"predecessor-version":[{"id":7183,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2208\/revisions\/7183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/2209"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=2208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=2208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=2208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}