{"id":4218,"date":"2017-10-06T20:23:10","date_gmt":"2017-10-06T17:23:10","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4218"},"modified":"2017-10-06T20:28:12","modified_gmt":"2017-10-06T17:28:12","slug":"we-aggressively-protect-our-users-and-were-proud-of-it","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/we-aggressively-protect-our-users-and-were-proud-of-it\/4218\/","title":{"rendered":"Kullan\u0131c\u0131lar\u0131m\u0131z\u0131 agresif bir tutumla koruyoruz ve bundan gurur duyuyoruz"},"content":{"rendered":"<p>D\u00fcn Kaspersky Lab hakk\u0131nda sansasyonel bir <a href=\"https:\/\/www.wsj.com\/articles\/russian-hackers-stole-nsa-data-on-u-s-cyber-defense-1507222108\" target=\"_blank\" rel=\"noopener nofollow\">medya haberi<\/a> yay\u0131nland\u0131. Bir\u00e7ok iddian\u0131n yan\u0131 s\u0131ra Kaspersky Lab\u2019\u0131n, s\u00f6zle\u015fmeli bir \u00e7al\u0131\u015fan\u0131n ev bilgisayar\u0131 arac\u0131l\u0131\u011f\u0131yla bir istihbarat te\u015fkilat\u0131ndan ba\u015fka bir istihbarat te\u015fkilat\u0131 i\u00e7in hassas bilgiler ald\u0131\u011f\u0131 yaz\u0131ld\u0131. Makaledeki ba\u015fka bir su\u00e7lama ise yeni k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yakalama y\u00f6ntemlerimizin \u201cagresif\u201d oldu\u011fu y\u00f6n\u00fcndeydi.<\/p>\n<p><a href=\"https:\/\/eugene.kaspersky.com\/2015\/08\/14\/the-abracadabra-of-anonymous-sources\/\" target=\"_blank\" rel=\"noopener\">Gizli kaynaklar<\/a> taraf\u0131ndan a\u00e7\u0131klanan (ne kadar ilgin\u00e7) bu ilk iddia d\u00fc\u015f\u00fck b\u00fct\u00e7eli bir film senaryosu gibi g\u00f6r\u00fcn\u00fcyor. Bu ilk iddia hakk\u0131nda <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2017_kaspersky-lab-response-to-the-alleged-incident-reported-by-the-wall-street-journal-in-an-article-published-on-october-5-2017\" target=\"_blank\" rel=\"noopener\">resmi a\u00e7\u0131klamam\u0131z<\/a> d\u0131\u015f\u0131nda yapabilece\u011fim \u00e7ok fazla yorum yok.<\/p>\n<p>https:\/\/twitter.com\/GossiTheDog\/status\/916014429749334023<\/p>\n<p><em>Kaspersky ile ilgili hi\u00e7bir kan\u0131t yok. Bu, yaln\u0131zca NSA\u2019n\u0131n (Ulusal G\u00fcvenlik Ajans\u0131) h\u00e2l\u00e2 k\u00f6t\u00fc g\u00fcvenlik \u00f6nlemleri kulland\u0131\u011f\u0131n\u0131 ve verilerin s\u0131zd\u0131r\u0131ld\u0131\u011f\u0131n\u0131 fark etmedi\u011fini kan\u0131tl\u0131yor.<\/em><\/p>\n<p>Ancak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla m\u00fccadele konusunda agresif bir tutumumuz oldu\u011fu yorumuna kesinlikle kat\u0131l\u0131yorum. Kayna\u011f\u0131 ne olursa olsun k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 kesinlikle ve agresif bir \u015fekilde tespit ediyor ve temizliyoruz. Bunu da 20 y\u0131ld\u0131r gururla dile getiriyoruz. Bu nedenle ba\u011f\u0131ms\u0131z, \u00fc\u00e7\u00fcnc\u00fc taraf k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tespiti testlerinde s\u00fcrekli olarak <a href=\"https:\/\/www.kaspersky.com.tr\/top3\" target=\"_blank\" rel=\"noopener\">en \u00fcst s\u0131ralarda<\/a> yer al\u0131yoruz. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve siber su\u00e7lularla m\u00fccadelede agresif olmak konusunda hatal\u0131 oldu\u011fumuzu d\u00fc\u015f\u00fcnm\u00fcyoruz. Zaten bunlar\u0131 yapmayan bir program\u0131 kabul etmemelisiniz. Bu konuda tart\u0131\u015fmaya gerek yok.<\/p>\n<p>M\u00fc\u015fterilerimizi korurken (t\u00fcm di\u011fer siber g\u00fcvenlik tedarik\u00e7ileri gibi) bilgisayar\u0131n sa\u011fl\u0131\u011f\u0131n\u0131 da kontrol ederiz. G\u00fcvenlik \u00e7\u00f6z\u00fcmlerimiz sorunlar\u0131 g\u00f6rebilmek i\u00e7in bir X-I\u015f\u0131n\u0131 gibi \u00e7al\u0131\u015f\u0131r. Ancak g\u00f6rd\u00fc\u011f\u00fc \u015feyleri belirli bir kullan\u0131c\u0131 ile e\u015fle\u015ftirmez. Kullan\u0131c\u0131lar\u0131m\u0131z\u0131 siber sald\u0131r\u0131lardan korurken tam olarak neler yapt\u0131\u011f\u0131m\u0131z\u0131 ve yapmad\u0131\u011f\u0131m\u0131z\u0131 biraz daha ayr\u0131nt\u0131l\u0131 a\u00e7\u0131klayay\u0131m:<\/p>\n<h3>Neler yap\u0131yoruz?<\/h3>\n<p>Her g\u00fcn \u015f\u00fcpheli k\u00f6t\u00fc yaz\u0131l\u0131mlar\u0131 i\u015faretleyen yeni sezgisel algoritmalar ve geli\u015fmi\u015f tespit mekanizmalar\u0131 geli\u015ftiririz. Bu \u015f\u00fcpheli yaz\u0131l\u0131mlar, otomatik analiz i\u00e7in makine \u00f6\u011frenimiyle \u00e7al\u0131\u015fan arka uca g\u00f6nderilir. Sezgisel algoritmalar, yaln\u0131zca belirli bir veri t\u00fcr\u00fcne odaklanacak \u015fekilde tasarlanm\u0131\u015ft\u0131r. Bu veri t\u00fcr\u00fc bilgisayar sa\u011fl\u0131\u011f\u0131na zarar verme ihtimali olan \u00f6zelliklere sahip verileri kapsar. Sezgisel algoritmalar\u0131n \u00f6nemsedi\u011fi tek \u015fey verilerin riskidir.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Consensus on infosec Twitter is that Kaspersky may not have colluded with RU gov; just maybe their product may be horrendously compromised.<\/p>\n<p>\u2014 Matthew Green (@matthew_d_green) <a href=\"https:\/\/twitter.com\/matthew_d_green\/status\/916016499747205120?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 5, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><em>InfoSec Twitter\u2019da \u00e7o\u011funlu\u011fun fikrine g\u00f6re, Kaspersky Rus h\u00fck\u00fcmetiyle gizli bir anla\u015fma yapmam\u0131\u015f olabilir. Belki de \u00fcr\u00fcnlerinin g\u00fcvenli\u011fi korkun\u00e7 bir \u015fekilde ihlal edilmi\u015ftir.<\/em><\/p>\n<p>Bir\u00e7ok kullan\u0131c\u0131y\u0131 etkileme olas\u0131l\u0131\u011f\u0131 olan <a href=\"https:\/\/apt.securelist.com\/#!\/threats\/\" target=\"_blank\" rel=\"noopener\">\u00fcst d\u00fczey siber tehditlere<\/a> odaklan\u0131r\u0131z. Bu t\u00fcr tehditler genelde son derece karma\u015f\u0131kt\u0131r ve her zaman i\u00e7in ilk bak\u0131\u015fta k\u00f6t\u00fc ama\u00e7l\u0131 g\u00f6r\u00fcnmeyen birden fazla bile\u015fenden olu\u015fabilir. L\u00fctfen, \u00f6rnek olmas\u0131 a\u00e7\u0131s\u0131ndan <a href=\"https:\/\/securelist.com\/shadowpad-in-corporate-networks\/81432\/\" target=\"_blank\" rel=\"noopener\">ShadowPad<\/a> ile ilgili son makalemizi okuyun.<\/p>\n<p>Her t\u00fcrl\u00fc tehdidi ara\u015ft\u0131r\u0131r ve analiz ederiz. Hi\u00e7birini g\u00f6rmezden gelmeyiz. Ayr\u0131ca, kullan\u0131c\u0131lar\u0131m\u0131z\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan koruyacak, bilgisayarlar\u0131n\u0131 daha g\u00fcvenli hale getirecek ve endi\u015felenmek yerine kullan\u0131c\u0131 deneyimlerinin tad\u0131n\u0131 \u00e7\u0131karmalar\u0131n\u0131 sa\u011flayacak sistemlere \u00e7ok fazla kaynak ay\u0131r\u0131r\u0131z.<\/p>\n<p>Bu son makalenin ard\u0131ndan \u015funu vurgulamak istiyorum: teknoloji \u00fcr\u00fcnlerimiz \u015f\u00fcpheli bir nesne tespit ederse ve bu nesne k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m olarak tan\u0131mlan\u0131rsa dakikalar i\u00e7inde <em>t\u00fcm<\/em> m\u00fc\u015fterilerimiz (kim olduklar\u0131 veya nerede ya\u015fad\u0131klar\u0131 fark etmeksizin) bu tehditten korunur. \u00c7ok ciddi vakalarda (<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-windows-update\/3218\/\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a> gibi global k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m salg\u0131nlar\u0131 veya <a href=\"https:\/\/securelist.com\/?s=equation\" target=\"_blank\" rel=\"noopener\">Equation<\/a> gibi karma\u015f\u0131k siber casusluk platformlar\u0131) ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z tehdidi derinlemesine analiz eder ve tehlike g\u00f6stergelerini a\u00e7\u0131k\u00e7a yazd\u0131klar\u0131 bir ara\u015ft\u0131rma yay\u0131nlar. Yani sadece m\u00fc\u015fterilerimiz de\u011fil ayn\u0131 zamanda t\u00fcm di\u011fer kullan\u0131c\u0131lar ve siber g\u00fcvenlik sekt\u00f6r\u00fcndeki meslekta\u015flar\u0131m\u0131z da bu yeni tehditten nas\u0131l korunacaklar\u0131 hakk\u0131nda bilgi sahibi <a href=\"https:\/\/securelist.com\/wannacry-faq-what-you-need-to-know-today\/78411\/\" target=\"_blank\" rel=\"noopener\">olabilir<\/a>. Misyonumuz m\u00fc\u015fterilerimizin g\u00fcvenli\u011fidir ve kaynaklar\u0131 ya da ama\u00e7lar\u0131 ne olursa olsun m\u00fc\u015fterilerimizi <em>t\u00fcm<\/em> siber g\u00fcvenlik tehditlerine kar\u015f\u0131 korumaya kararl\u0131y\u0131z. Bu yakla\u015f\u0131m i\u015fimizin temelini olu\u015fturur ve kullan\u0131c\u0131lar\u0131m\u0131z da bize bunun i\u00e7in \u00f6deme yapar.<\/p>\n<div class=\"pullquote\"><\/div>\n<blockquote><p>Kullan\u0131c\u0131 g\u00fcvenini sarsmak kolayd\u0131r ve sekt\u00f6r bunu an\u0131nda fark eder. Kaspersky Lab, bu sekt\u00f6rdeki 20 y\u0131l\u0131 boyunca m\u00fc\u015fterilerinin g\u00fcvenli\u011fine olan ba\u011fl\u0131l\u0131\u011f\u0131n\u0131n sorgulanmas\u0131na hi\u00e7 \u015fans tan\u0131mam\u0131\u015ft\u0131r.<\/p><\/blockquote>\n<p>https:\/\/twitter.com\/pwnallthethings\/status\/915990527509762050<br>\n<em><br>\nE\u011fer belirtiler yaln\u0131zca NSA implantlar\u0131nda ve NSA a\u00e7\u0131klar\u0131ndan yararlanan yaz\u0131l\u0131mdaysa, bu durumda Kaspersky yaln\u0131zca i\u015fini yap\u0131yor ve ortada bir Kaspersky-Rusya i\u015f birli\u011fi yok.<\/em><\/p>\n<p>Siber g\u00fcvenlik tehditleriyle m\u00fccadelede kulland\u0131\u011f\u0131m\u0131z tek y\u00f6ntem budur. Bu yeni iddialar bana \u015fu \u015fekilde olu\u015fturulmu\u015f gibi geldi: Birisi tehditlerle m\u00fccadele etme s\u00fcrecimizi alm\u0131\u015f, baz\u0131 hayali detaylar eklemi\u015f ve bu yeni d\u00fc\u015f\u00fck b\u00fct\u00e7eli film senaryosunu olu\u015fturmu\u015f.<\/p>\n<h3>Neler yapm\u0131yoruz?<\/h3>\n<p>G\u00fc\u00e7, sorumluluk getirir. M\u00fc\u015fterilerimizin bize olan g\u00fcvenini asla sarsmay\u0131z. G\u00fcvenlerini yaln\u0131zca bir kez sarsmam\u0131z bile, sekt\u00f6r\u00fcn bunu hemen fark etmesi ve i\u015f hayat\u0131m\u0131z\u0131n sona ermesi i\u00e7in yeterli olur ve bunu hak etmi\u015f oluruz.<\/p>\n<p>B\u00f6yle bir \u015feyin Kaspersky Lab veya di\u011fer tan\u0131nm\u0131\u015f g\u00fcvenlik \u015firketleri i\u00e7in imkans\u0131z olmas\u0131n\u0131n nedenini anlamak i\u00e7in siber g\u00fcvenlik sekt\u00f6r\u00fcn\u00fcn nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 anlamak gerekir. Bizim sekt\u00f6r\u00fcm\u00fczde iki grup vard\u0131r: Birincisi, yaz\u0131l\u0131mlar\u0131 bozmak, casusluk ara\u00e7lar\u0131 olu\u015fturmak ve en u\u00e7 noktada devletlerin casusluk faaliyetlerine yard\u0131m etmek gibi sald\u0131r\u0131 ama\u00e7l\u0131 hareket edenlerdir. \u0130kincisi ise kullan\u0131c\u0131lar i\u00e7in m\u00fccadele eden, onlar\u0131n yan\u0131nda yer alan, onlar\u0131 sald\u0131r\u0131lardan koruyan, bilgisayarlar\u0131 savunmas\u0131 i\u00e7in yaz\u0131l\u0131mlar yazan ve gizli servislerin i\u015flerini bozan \u015firketlerdir.<\/p>\n<p>Bu, kendini \u00e7ok farkl\u0131 \u015fekillerde g\u00f6steren temel bir ayr\u0131md\u0131r. Bu iki grup, bir kategoriden di\u011ferine etik olarak kabul edilen davran\u0131\u015flardan sayg\u0131nl\u0131\u011fa ve do\u011fruyu yanl\u0131\u015ftan ay\u0131rmaya kadar farkl\u0131l\u0131k g\u00f6sterir.<\/p>\n<blockquote><p>Bu iddialar \u015fu \u015fekilde olu\u015fturulmu\u015f gibi g\u00f6r\u00fcn\u00fcyor: Birisi siber g\u00fcvenlik sekt\u00f6r\u00fcn\u00fcn tehditlerle m\u00fccadele etme s\u00fcrecini alm\u0131\u015f, baz\u0131 hayali detaylar eklemi\u015f ve bu yeni d\u00fc\u015f\u00fck b\u00fct\u00e7eli film senaryosunu olu\u015fturmu\u015f.<\/p><\/blockquote>\n<p>KL, <a href=\"https:\/\/eugene.kaspersky.com\/2017\/07\/21\/then-and-now-20-years-in-between-all-uphill\/\" target=\"_blank\" rel=\"noopener\">20 y\u0131ld\u0131r<\/a> kullan\u0131c\u0131lar\u0131 i\u00e7in m\u00fccadele etmektedir. <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/machine-learning\/\" target=\"_blank\" rel=\"noopener nofollow\">Makine \u00f6\u011frenimi<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-security-network-explained\/8657\/\" target=\"_blank\" rel=\"noopener nofollow\">bulut g\u00fcvenli\u011fi<\/a> gibi bir\u00e7ok teknolojiye \u00f6nc\u00fcl\u00fck etmi\u015f, d\u00fcnyan\u0131n en iyi g\u00fcvenlik \u00e7\u00f6z\u00fcmlerinden birini yaratm\u0131\u015f ve YALNIZCA en \u00fcst d\u00fczey etik standartlara uyan ki\u015fileri i\u015fe almaya \u00e7al\u0131\u015fm\u0131\u015ft\u0131r.<\/p>\n<p>Uzmanlar\u0131m\u0131z\u0131n hepsi, herhangi bir devlet ad\u0131na yap\u0131lan casusluk faaliyetini kolayla\u015ft\u0131rmak i\u00e7in kullan\u0131c\u0131 g\u00fcvenini k\u00f6t\u00fcye kullanmay\u0131 etik d\u0131\u015f\u0131 olarak kabul eder. Bunu yapabilecek ki\u015filer bir \u015fekilde \u015firkete s\u0131zmay\u0131 ba\u015farsa bile bu riski azaltmak i\u00e7in bir s\u00fcr\u00fc \u015firket i\u00e7i ve kurumsal strateji kullan\u0131yoruz. Ayr\u0131ca Kaspersky Lab\u2019de 3000\u2019in \u00fczerinde \u00e7al\u0131\u015fan var. B\u00f6yle bir faaliyet olsayd\u0131 \u00e7al\u0131\u015fanlar\u0131m\u0131zdan biri fark ederdi. Bunu herkesten saklamak imkans\u0131zd\u0131r.<\/p>\n<h3>\u0130\u015fin karma\u015f\u0131k yan\u0131<\/h3>\n<p>\u015eirket i\u00e7inde bir g\u00fcvenlik ekibimiz olmas\u0131na ve \u00f6d\u00fcl avc\u0131l\u0131\u011f\u0131 (<a href=\"https:\/\/hackerone.com\/kaspersky\" target=\"_blank\" rel=\"noopener nofollow\">bug bounty<\/a>) programlar\u0131 kullanmam\u0131za ra\u011fmen \u00fcr\u00fcnlerimizde hi\u00e7bir g\u00fcvenlik sorununun olmad\u0131\u011f\u0131na dair %100 garanti veremeyiz. Zaten bunu yapabilecek hi\u00e7bir yaz\u0131l\u0131m tedarik\u00e7isi yoktur. Yaz\u0131l\u0131m, insanlar taraf\u0131ndan yap\u0131l\u0131r ve insanlar hata yapar. Bunun \u00f6nlemenin hi\u00e7bir yolu yoktur.<\/p>\n<blockquote><p>G\u00fcvenlik teknolojileri ve \u00f6nlemleri ne kadar m\u00fckemmel olsa da en eski tehdit arac\u0131 olan ucuz bir USB bellek ve yanl\u0131\u015f y\u00f6nlendirilen bir \u00e7al\u0131\u015fan nedeniyle milyonlarca insan\u0131n g\u00fcvenli\u011fi ihlal edilebilir.<\/p><\/blockquote>\n<p>\u015eimdi haberde yaz\u0131lanlar\u0131n do\u011fru oldu\u011funu <em>varsayal\u0131m<\/em>. Yani Rus hackerlar\u0131n kullan\u0131c\u0131lar\u0131m\u0131zdan birinin ki\u015fisel bilgisayar\u0131na kurulu \u00fcr\u00fcnlerimizde bir zay\u0131f noktay\u0131 kullanm\u0131\u015f oldu\u011funu ve ulusal g\u00fcvenli\u011fi korumakla g\u00f6revli resmi kurumlar\u0131n bunu bildi\u011fini farz edelim o halde bunu neden bize bildirmediler? Saatler i\u00e7erisinde \u00e7ok ciddi hatalar i\u00e7in yama \u00fcretebiliriz. O halde neden bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 bize bildirerek d\u00fcnyay\u0131 daha g\u00fcvenli bir hale getirmesinler? Bunu yapmamalar\u0131 i\u00e7in hi\u00e7bir etik gerek\u00e7e g\u00f6remiyorum.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">You expected him to apologize for his product detecting NSA's malware and reporting it? Or for idiots taking classified materials home?<\/p>\n<p>\u2014 Vess (@VessOnSecurity) <a href=\"https:\/\/twitter.com\/VessOnSecurity\/status\/916003231414632449?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 5, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><em>Kaspersky\u2019dan, \u00fcr\u00fcn\u00fcn\u00fcn NSA\u2019n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131 tespit etti\u011fi ve bildirdi\u011fi i\u00e7in mi, yoksa gizli materyalleri evine g\u00f6t\u00fcren aptallar i\u00e7in mi \u00f6z\u00fcr dilemesini bekliyordunuz?<\/em><\/p>\n<p>Son olarak, \u015fu rahats\u0131z edici d\u00fc\u015f\u00fcnceyi akl\u0131mdan \u00e7\u0131karam\u0131yorum: g\u00fcvenlik teknolojileri ve \u00f6nlemleri ne kadar m\u00fckemmel olsa da en eski tehdit arac\u0131 olan ucuz bir USB bellek ve yanl\u0131\u015f y\u00f6nlendirilen bir \u00e7al\u0131\u015fan nedeniyle milyonlarca insan\u0131n g\u00fcvenli\u011fi ihlal edilebilir.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>WSJ\u2019N\u0130N S\u0130BER G\u00dcVENL\u0130K HABER\u0130 \u0130\u00c7\u0130N @E_KASPERSKY\u2019N\u0130N A\u00c7IKLAMASI: DO\u011eRULAR, YALANLAR VE RAHATSIZ ED\u0130C\u0130 AYRINTILAR<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F9cFh&amp;text=WSJ%26%238217%3BN%C4%B0N+S%C4%B0BER+G%C3%9CVENL%C4%B0K+HABER%C4%B0+%C4%B0%C3%87%C4%B0N+%40E_KASPERSKY%26%238217%3BN%C4%B0N+A%C3%87IKLAMASI%3A+DO%C4%9ERULAR%2C+YALANLAR+VE+RAHATSIZ+ED%C4%B0C%C4%B0+AYRINTILAR+\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>D\u00fcn Kaspersky Lab hakk\u0131nda sansasyonel bir medya haberi yay\u0131nland\u0131. Bir\u00e7ok iddian\u0131n yan\u0131 s\u0131ra Kaspersky Lab&#8217;\u0131n, s\u00f6zle\u015fmeli bir \u00e7al\u0131\u015fan\u0131n ev bilgisayar\u0131 arac\u0131l\u0131\u011f\u0131yla bir istihbarat te\u015fkilat\u0131ndan ba\u015fka bir istihbarat te\u015fkilat\u0131 i\u00e7in hassas bilgiler ald\u0131\u011f\u0131 yaz\u0131ld\u0131. Makaledeki ba\u015fka bir su\u00e7lama ise yeni k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yakalama y\u00f6ntemlerimizin &#8220;agresif&#8221; oldu\u011fu y\u00f6n\u00fcndeydi.<\/p>\n","protected":false},"author":13,"featured_media":4225,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,995],"tags":[1368,1367,878,553],"class_list":{"0":"post-4218","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-technology","9":"tag-bt-sektoru","10":"tag-nsa","11":"tag-teknoloji","12":"tag-zararli-yazilim-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/we-aggressively-protect-our-users-and-were-proud-of-it\/4218\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/we-aggressively-protect-our-users-and-were-proud-of-it\/11340\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/we-aggressively-protect-our-users-and-were-proud-of-it\/14520\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/we-aggressively-protect-our-users-and-were-proud-of-it\/9614\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/nsa\/","name":"NSA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4218"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4218\/revisions"}],"predecessor-version":[{"id":4227,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4218\/revisions\/4227"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4225"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}