{"id":5075,"date":"2018-07-10T11:18:12","date_gmt":"2018-07-10T08:18:12","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5075"},"modified":"2020-05-13T19:28:38","modified_gmt":"2020-05-13T16:28:38","slug":"preventing-dangerous-screenshots","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/preventing-dangerous-screenshots\/5075\/","title":{"rendered":"Siyah karenin gizemi"},"content":{"rendered":"<p>Hey millet!<\/p>\n<p>Siyah karenin ne oldu\u011funu tahmin edebilir misiniz? Hay\u0131r hay\u0131r, Malevich\u2019in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Black_Square_(painting)\" target=\"_blank\" rel=\"noopener nofollow\">Siyah Kare<\/a>\u2018sinin tahrip edilmi\u015f bir versiyonu gelmesin akl\u0131n\u0131za.<\/p>\n<p>Kabataslak anlatacak olursak; bu siyah kutu, \u015f\u00fcpheli bir uygulaman\u0131n <a href=\"http:\/\/kas.pr\/kdktstr\" target=\"_blank\" rel=\"noopener\">Kaspersky Total Security<\/a> gibi Kaspersky Lab \u00fcr\u00fcnleri taraf\u0131ndan korunan bir bilgisayarda ald\u0131\u011f\u0131 ekran g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fcn g\u00f6r\u00fcn\u00fcm\u00fc. Peki neden b\u00f6yle bir g\u00f6r\u00fcnt\u00fc ortaya \u00e7\u0131k\u0131yor?<\/p>\n<p>\u00dcr\u00fcnlerimiz ekran g\u00f6r\u00fcnt\u00fclerini koruyor \u00e7\u00fcnk\u00fc siber su\u00e7lular ve di\u011fer siber pislikler, kullan\u0131c\u0131 hesaplar\u0131na eri\u015fmeye ger\u00e7ekten b\u00fcy\u00fck bir ilgi duyuyor. Bu davetsiz misafirlerin kendilerine g\u00f6re farkl\u0131 nedenleri olabilir (\u00f6rne\u011fin; para kazanmak, <a href=\"https:\/\/www.wiki-zero.net\/index.php?q=aHR0cHM6Ly90ci53aWtpcGVkaWEub3JnL3dpa2kvSGVyb3N0cmF0dXM\" target=\"_blank\" rel=\"noopener nofollow\">Herostratik<\/a> \u015f\u00f6hret hayallerini ger\u00e7ekle\u015ftirmek, e\u015flerini\/rakiplerini\/d\u00fc\u015fmanlar\u0131n\u0131 izlemek gibi) fakat farkl\u0131 y\u00f6ntemler kullansalar da ama\u00e7lar\u0131 her zaman ayn\u0131d\u0131r: kullan\u0131c\u0131 hesaplar\u0131na eri\u015fmek.<\/p>\n<p>\u201cTamam da, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar neden ekran g\u00f6r\u00fcnt\u00fcs\u00fc al\u0131yor ki?\u201d diye merak ediyor olabilirsiniz. Siteler ve yaz\u0131l\u0131m \u00fcr\u00fcnleri bir \u015fifrede kullan\u0131lan karakterlerin yerine noktalar koyar. Peki bunun amac\u0131 nedir?<\/p>\n<p>Asl\u0131nda, bu noktalardan kurtulman\u0131n bir\u00e7ok yolu vard\u0131r.<\/p>\n<p>Birincisi, kullan\u0131c\u0131lar genellikle girilen \u015fifreyi g\u00f6rme se\u00e7ene\u011fine sahiptir (\u201c\u015fifreyi g\u00f6ster\u201d veya benzeri). \u0130kincisi, pek \u00e7ok hizmet her zaman bir \u015fifrenin son birka\u00e7 sembol\u00fcn\u00fc g\u00f6sterir. \u00dc\u00e7\u00fcnc\u00fcs\u00fc, baz\u0131 hizmetler \u015fifreyi yaln\u0131zca kullan\u0131c\u0131 bir sonraki giri\u015f alan\u0131na ilerledi\u011finde noktalarla de\u011fi\u015ftirir.<\/p>\n<p>D\u00f6rd\u00fcnc\u00fcs\u00fc, baz\u0131 hizmetler maskeleme noktalar\u0131 kullanmaz, bunun yerine \u015fifre alan\u0131n\u0131n boyutunu k\u00fc\u00e7\u00fclt\u00fcr. Buradaki ama\u00e7, \u015fifreyi bir ba\u015fkas\u0131 i\u00e7in okunaks\u0131z hale getirmektir (fakat maalesef, bu y\u00f6ntem k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar i\u00e7in cayd\u0131r\u0131c\u0131 de\u011fildir). Be\u015fincisi, <a href=\"https:\/\/lifehacker.com\/5946529\/easily-reveal-hidden-passwords-in-any-browser\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7e\u015fitli hileler<\/a> ve ara\u00e7lar (pwdcrack gibi), k\u00f6t\u00fc adamlar\u0131n \u015fifre-maskeleme noktalar\u0131n\u0131 kapatmas\u0131n\u0131 sa\u011flar. Sonu\u00e7 olarak, ekran\u0131n\u0131zda \u015fifrenizin g\u00f6sterilme ihtimali s\u0131f\u0131ra yak\u0131nd\u0131r ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, bu durumu kolayl\u0131kla kendi lehine \u00e7evirebilir.<\/p>\n<p>Bu arada; birinin arkan\u0131zdan ekrana bakma ihtimali veya g\u00fcvenlik kameralar\u0131n\u0131n \u015fifrenizi g\u00f6r\u00fcnt\u00fcleme ihtimali, k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m\u0131n ekran g\u00f6r\u00fcnt\u00fclerini kullanarak \u015fifrenize eri\u015fme tehlikesiyle kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda olduk\u00e7a \u00f6nemsiz kal\u0131r.<\/p>\n<p>Bankac\u0131l\u0131k Trojan\u2019lar\u0131 aras\u0131nda lider olarak g\u00f6r\u00fclen Zeus ve Zeus\u2019un bir\u00e7ok <a href=\"https:\/\/www.kaspersky.com\/blog\/atmos-yet-another-zeus-variant-is-threatening-businesses\/5476\/\" target=\"_blank\" rel=\"noopener nofollow\">kopyas\u0131<\/a>, bu i\u015flevi kendi ara\u00e7 setinde i\u00e7erir. \u00d6rne\u011fin; bu kopyalardan biri olan <a href=\"https:\/\/threatpost.com\/kins-banking-trojan-a-successor-to-citadel\/101440\/\" target=\"_blank\" rel=\"noopener nofollow\">KINS<\/a>, sadece tu\u015flara bas\u0131ld\u0131\u011f\u0131nda de\u011fil, ayn\u0131 zamanda fare t\u0131klat\u0131ld\u0131\u011f\u0131nda da ekran g\u00f6r\u00fcnt\u00fcleri alan bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirir. Yani, bir bankan\u0131n web sitesinde \u015fifre girmek i\u00e7in sanal klavye veya tek seferlik \u015fifreler kullan\u0131lsa bile, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yine de girilen sembolleri alg\u0131layabilir.<\/p>\n<p>Hedef yaln\u0131zca \u015fifreler de olmayabilir. \u00c7evrimi\u00e7i bir \u015fey al\u0131rken girilen banka kart\u0131 bilgilerine ne dersiniz? Veya kimli\u011finizi do\u011frulaman\u0131z veya kilitli bir hesaba eri\u015fiminizi yeniden kazanman\u0131z i\u00e7in sorulan g\u00fcvenlik sorular\u0131na? Ki\u015fisel bilgilere? Mesaj i\u00e7eriklerine? Liste uzad\u0131k\u00e7a uzar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-privacy\">\n<p><\/p>\n<p>Ger\u00e7ekten de, bu s\u0131radan ekran g\u00f6r\u00fcnt\u00fcs\u00fc, \u00f6zel bilgilerimize ve s\u0131rlar\u0131m\u0131za y\u00f6nelik \u00f6nemli bir ge\u00e7ittir. Bu y\u00fczden, bir ekran g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fcn d\u0131\u015far\u0131daki ki\u015filere sa\u011flayabilece\u011fi bilgileri korumak olduk\u00e7a \u00f6nemlidir. <a href=\"https:\/\/eugene.kaspersky.com\/2012\/08\/14\/safe-money-online-banking-security\" target=\"_blank\" rel=\"noopener\">G\u00fcvenli Para<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/how-and-why-you-should-use-the-virtual-keyboard\/3040\/\" target=\"_blank\" rel=\"noopener nofollow\">Sanal Klavye<\/a> kullanmak elbette faydal\u0131d\u0131r fakat g\u00fcvenlik bilinci oldu\u011funu iddia eden insanlar da dahil her insan bu i\u015flevleri kullanmaz. Bununla birlikte, siber k\u00f6t\u00fc adamlar\u0131n cephaneliklerinde ekran g\u00f6r\u00fcnt\u00fcleri gibi b\u00f6ylesine g\u00fc\u00e7l\u00fc bir silah bulunurken s\u0131radan siber g\u00fcvenlik i\u015flevlerinin tam koruma sa\u011flamas\u0131 m\u00fcmk\u00fcn de\u011fildir. Fakat biz haz\u0131r\u0131z, hodri meydan!<\/p>\n<p>\u00dcr\u00fcnlerimizin \u00e7o\u011funda, uygulamalar\u0131n ekran g\u00f6r\u00fcnt\u00fcs\u00fc almas\u0131na izin veren <a href=\"https:\/\/www.wiki-zero.net\/index.php?q=aHR0cHM6Ly90ci53aWtpcGVkaWEub3JnL3dpa2kvVXlndWxhbWFfcHJvZ3JhbWxhbWFfYXJheSVDMyVCQ3olQzMlQkM\" target=\"_blank\" rel=\"noopener nofollow\">API<\/a> i\u015flevlerini koruyan patentli bir teknoloji bulunmaktad\u0131r. Bu sayede; herhangi bir uygulama, ekran g\u00f6r\u00fcnt\u00fcs\u00fc almaya \u00e7al\u0131\u015ft\u0131\u011f\u0131nda \u00fcr\u00fcn \u015funlar\u0131 ger\u00e7ekle\u015ftirir:<\/p>\n<ul>\n<li>Hangi uygulamalarda pencerelerin a\u00e7\u0131k oldu\u011funu g\u00f6sterir;<\/li>\n<li>\u00c7e\u015fitli bile\u015fenlerden ve alt sistemlerden (\u00f6rne\u011fin <a href=\"https:\/\/eugene.kaspersky.com\/2011\/09\/15\/features-youd-normally-never-hear-about\/\" target=\"_blank\" rel=\"noopener\">Sistem Watcher<\/a> ve <a href=\"https:\/\/eugene.kaspersky.com\/2011\/09\/15\/features-youd-normally-never-hear-about\" target=\"_blank\" rel=\"noopener\">Safe Money<\/a>) elde edilen verilere dayanarak, bu pencerelerin potansiyel olarak gizli veya ki\u015fisel veriler i\u00e7erip i\u00e7ermedi\u011fini belirler;<\/li>\n<li>Ekrana eri\u015fim talep eden uygulamalar\u0131n g\u00fcven derecesini analiz eder;<\/li>\n<li>Ekran g\u00f6r\u00fcnt\u00fclerine izin verilip verilmeyece\u011fine karar verir. G\u00fcvenli de\u011filse, ekran g\u00f6r\u00fcnt\u00fclerini siyah kare olarak g\u00f6sterir.<\/li>\n<\/ul>\n<p>Daha bitmedi: Bonus!<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 ekran g\u00f6r\u00fcnt\u00fclerine kar\u015f\u0131 koruma sa\u011flayan ayn\u0131 teknoloji, \u00f6nceden bilinmeyen siber sald\u0131r\u0131lar\u0131n tespit edilmesine de yard\u0131mc\u0131 olur. Ger\u00e7ek bir amac\u0131 olmaks\u0131z\u0131n di\u011fer \u201cpencereler\u201de ilgi g\u00f6steren uygulamalar \u015f\u00fcphe uyand\u0131r\u0131r ve kendi notlar\u0131n\u0131 d\u00fc\u015f\u00fcr\u00fcr; bu da onlar\u0131n <a href=\"https:\/\/eugene.kaspersky.com\/2012\/09\/18\/crowdsourcing-security\" target=\"_blank\" rel=\"noopener\">KSN<\/a> yoluyla <a href=\"https:\/\/www.kaspersky.com\/blog\/what-humachine-intelligence-is\/17995\/\" target=\"_blank\" rel=\"noopener nofollow\">makine \u00f6\u011frenimi<\/a> taraf\u0131ndan \u00f6nceden tespit edilmesine veya uzman biri taraf\u0131ndan manuel olarak belirlenmesine neden olur. Bu yolla; herkesin yarar\u0131 ad\u0131na, y\u00fcksek e\u011fitimli siber beyinlerle birlikte sarf etti\u011fimiz k\u00fcresel bir \u00e7aba g\u00f6stererek internetin genel tehlike seviyesini d\u00fc\u015f\u00fcrmek i\u00e7in k\u00fc\u00e7\u00fckl\u00fc b\u00fcy\u00fckl\u00fc ad\u0131mlarla hep birlikte y\u00fcr\u00fcyoruz.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siyah karenin ne oldu\u011funu tahmin edebilir misiniz? Hay\u0131r hay\u0131r, Malevich&#8217;in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Black_Square_(painting)\">Siyah Kare<\/a>&#8216;sinin tahrip edilmi\u015f bir versiyonu gelmesin akl\u0131n\u0131za.<\/p>\n","protected":false},"author":13,"featured_media":5076,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[995,1285],"tags":[1655,625,537,990,551],"class_list":{"0":"post-5075","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"category-products","9":"tag-ekran-goruntusu","10":"tag-koruma","11":"tag-tehditler","12":"tag-teknolojiler","13":"tag-urunler-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/preventing-dangerous-screenshots\/5075\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/preventing-dangerous-screenshots\/13594\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/preventing-dangerous-screenshots\/11348\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/preventing-dangerous-screenshots\/15654\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/preventing-dangerous-screenshots\/13897\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/preventing-dangerous-screenshots\/13121\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/preventing-dangerous-screenshots\/16399\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/preventing-dangerous-screenshots\/15887\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/preventing-dangerous-screenshots\/20862\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/preventing-dangerous-screenshots\/22944\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/preventing-dangerous-screenshots\/10685\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/preventing-dangerous-screenshots\/10472\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/preventing-dangerous-screenshots\/9350\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/preventing-dangerous-screenshots\/17141\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/preventing-dangerous-screenshots\/9737\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/preventing-dangerous-screenshots\/20787\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/preventing-dangerous-screenshots\/16903\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/preventing-dangerous-screenshots\/20523\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/preventing-dangerous-screenshots\/20514\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/urunler-2\/","name":"\u00fcr\u00fcnler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5075"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5075\/revisions"}],"predecessor-version":[{"id":8279,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5075\/revisions\/8279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5076"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}