{"id":8521,"date":"2020-07-01T11:25:07","date_gmt":"2020-07-01T08:25:07","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8521"},"modified":"2020-07-01T11:25:07","modified_gmt":"2020-07-01T08:25:07","slug":"unusual-ways-to-leak-info","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/unusual-ways-to-leak-info\/8521\/","title":{"rendered":"\u015eirket verilerinizi asil bir \u015fekilde s\u0131zd\u0131rman\u0131n 4 yolu"},"content":{"rendered":"<p>E\u011fer Instagram\u2019da konser biletlerini barkodlar\u0131n\u0131 gizlemeden payla\u015f\u0131rsan\u0131z, birileri <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/never-post-barcodes-online\/2571\/\" target=\"_blank\" rel=\"noopener\">sizin yerinize en sevdi\u011finiz grubu g\u00f6rebilir<\/a>. Ayn\u0131 \u015fey barkodlar\u0131 gizledi\u011finizde de olabilir; <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-leak-image-info\/8098\/\" target=\"_blank\" rel=\"noopener\">ama bunu yanl\u0131\u015f arac\u0131 kullanarak yaparsan\u0131z<\/a>.<\/p>\n<p>Bununla beraber, biletlerle b\u00f6b\u00fcrlenmeden \u00f6nce barkodlar\u0131 d\u00fczg\u00fcn bir \u015fekilde gizlemek o kadar da zor de\u011fildir. \u0130\u00e7erisinde bilet ya da, diyelim ki, \u00fczerinde \u015fifre yaz\u0131l\u0131 yap\u0131\u015fkanl\u0131 not ka\u011f\u0131d\u0131 oldu\u011funu fark etmedi\u011finiz bir foto\u011fraf\u0131 payla\u015fmak ise bamba\u015fka bir konudur. \u0130\u015fte size insanlar\u0131n \u00e7evrimi\u00e7i ortamda fark etmeden ki\u015fisel verilerini payla\u015fmalar\u0131na birka\u00e7 \u00f6rnek\u2026<\/p>\n<h2>1. \u015eifrenin \u00f6n\u00fcnde \u00e7ekilmi\u015f foto\u011fraflar\u0131 payla\u015fmak<\/h2>\n<p>Ofislerde ve di\u011fer \u00e7al\u0131\u015fma mekanlar\u0131nda \u00e7ekilen foto\u011fraf ve videolar, \u015fifreleri ve s\u0131rlar\u0131 d\u00fc\u015f\u00fcnemeyece\u011finiz \u00f6l\u00e7\u00fcde ortaya sererler. \u00c7ok az insan i\u015f arkada\u015flar\u0131n\u0131n foto\u011fraf\u0131n\u0131 \u00e7ekerken arkada ne oldu\u011funa dikkat eder; bu utan\u00e7 verici, hatta tehlikeli sonu\u00e7lara yol a\u00e7abilir.<\/p>\n<h3>Askeri zeka (yoksunlu\u011fu)<\/h3>\n<p>2012\u2019de, \u0130ngiliz Kraliyet Hava Kuvvetleri <a href=\"https:\/\/nakedsecurity.sophos.com\/2012\/11\/21\/prince-william-photos-password\/\" target=\"_blank\" rel=\"noopener nofollow\">baltay\u0131 fena halde ta\u015fa vurdu<\/a>. O zamanlar Kraliyet Hava Kuvvetleri\u2019nde g\u00f6rev yapan Prens William hakk\u0131ndaki foto\u011frafl\u0131 bir haberle birlikte, MilFLIP (askeri u\u00e7u\u015f haberleri yay\u0131n\u0131) kullan\u0131c\u0131 giri\u015f bilgileri ortaya sa\u00e7\u0131ld\u0131. Cambridge D\u00fck\u00fc\u2019n\u00fcn arkas\u0131ndaki duvar\u0131 s\u00fcsleyen bir ka\u011f\u0131t par\u00e7as\u0131nda kullan\u0131c\u0131 ad\u0131 ve \u015fifresi yer al\u0131yordu.<\/p>\n<p>Kraliyet ailesinin resmi internet sitesinde yay\u0131nlanmalar\u0131ndan k\u0131sa s\u00fcre sonra, foto\u011fraflar r\u00f6tu\u015flanm\u0131\u015f halleriyle de\u011fi\u015ftirildi ve giri\u015f bilgileri yenilendi. Yeniden duvara as\u0131l\u0131p as\u0131lmad\u0131klar\u0131 ise bilinmiyor.<\/p>\n<div id=\"attachment_8525\" style=\"width: 508px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-8525\" class=\"wp-image-8525 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/06\/30165445\/unusual-ways-to-leak-info-pic-1.png\" alt=\"\" width=\"498\" height=\"487\"><p id=\"caption-attachment-8525\" class=\"wp-caption-text\">\u0130\u00e7 dekorasyon \u00f6\u011fesi olarak MilFLIP kullan\u0131c\u0131 giri\u015f bilgileri. <a href=\"https:\/\/nakedsecurity.sophos.com\/2012\/11\/21\/prince-william-photos-password\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Prens William olay\u0131 hi\u00e7 de nadir rastlanan bir \u015fey de\u011fil. Daha az tan\u0131nm\u0131\u015f askeri personel de, gerek bas\u0131n\u0131n yard\u0131m\u0131yla ya da yard\u0131m\u0131 olmadan, s\u0131rlar\u0131 \u00e7evrimi\u00e7i payla\u015f\u0131yor. \u00d6rne\u011fin, bir asker sosyal medyada gizli bilgileri g\u00f6steren \u00e7al\u0131\u015fma ekranlar\u0131n\u0131n \u00f6n\u00fcnde <a href=\"http:\/\/parliamentstreet.org\/press-room\/2014\/parliament-street-daily-telegraph-2\/\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7ekilmi\u015f bir selfie yay\u0131nlad\u0131<\/a>. Bu asker \u201cyeniden terbiye edilmekten ve e\u011fitimden\u201d ucuz kurtuldu.<\/p>\n<h3>Canl\u0131 yay\u0131n s\u0131z\u0131nt\u0131s\u0131<\/h3>\n<p>2015 y\u0131l\u0131nda, Frans\u0131z televizyon \u015firketi TV5Monde siber sald\u0131r\u0131 kurban\u0131 oldu. Kimli\u011fi belirsiz ki\u015filer \u015firketin <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/04\/french-tv-network-blames-an-islamist-group-for-11-station-blackout\/\" target=\"_blank\" rel=\"noopener nofollow\">internet sitesine ve Facebook sayfas\u0131na s\u0131z\u0131p<\/a> yay\u0131n\u0131n saatlerce kesilmesine sebep oldular.<\/p>\n<p>Takip eden olaylar hikayeyi tam bir sulu komediye d\u00f6n\u00fc\u015ft\u00fcrd\u00fc. Bir TV5Monde \u00e7al\u0131\u015fan\u0131 gazetecilere \u015firketin sosyal medya hesaplar\u0131n\u0131n \u015fifrelerinin \u00f6n\u00fcnde r\u00f6portaj verdi. G\u00f6r\u00fcnt\u00fclerde metinler zar zor okunuyordu, fakat i\u015fin merakl\u0131lar\u0131 TV5Monde\u2019un YouTube hesab\u0131n\u0131n \u015fifresini ele ge\u00e7irmeyi ba\u015fard\u0131lar.<\/p>\n<p>\u015eans eseri, bu olay ayn\u0131 zamanda \u2018\u015fifre nas\u0131l yarat\u0131lmamal\u0131\u2019 konulu bir ders oldu: Sorudaki gizli c\u00fcmlenin Frans\u0131zca\u2019da \u201cyoutube\u015fifresi\u201d anlam\u0131na gelen \u201clemotdepassedeyoutube\u201d oldu\u011fu ortaya \u00e7\u0131kt\u0131. Neyse ki \u015firketin YouTube hesab\u0131 ve di\u011fer hesaplar\u0131 zarar g\u00f6rmedi. Ancak, fondaki \u015fifre hikayesi ba\u015ftaki siber sald\u0131r\u0131 ile ilgili bir miktar d\u00fc\u015f\u00fcnmeyi gerektiriyor.<\/p>\n<div id=\"attachment_8526\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-8526\" class=\"wp-image-8526 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/06\/30165815\/unusual-ways-to-leak-info-pic-2.png\" alt=\"\" width=\"640\" height=\"362\"><p id=\"caption-attachment-8526\" class=\"wp-caption-text\">TV5Monde \u00e7al\u0131\u015fan\u0131 fondaki \u015fifrelerin \u00f6n\u00fcnde r\u00f6portaj veriyor. <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/04\/hacked-french-network-exposed-its-own-passwords-during-tv-interview\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Benzer bir olay, 2014 y\u0131l\u0131nda, 48. Super Bowl\u2019dan hemen \u00f6nce, <a href=\"https:\/\/www.zdnet.com\/article\/super-bowl-wi-fi-password-credentials-broadcast-in-pre-game-security-gaffe\/\" target=\"_blank\" rel=\"noopener nofollow\">stadyumun dahili Wi-Fi giri\u015f bilgileri<\/a> bir TV kameraman\u0131n\u0131n objektifine tak\u0131ld\u0131\u011f\u0131nda ya\u015fand\u0131. Kazaya ironi katarcas\u0131na, kamera g\u00f6r\u00fcnt\u00fcleri organizasyonun g\u00fcvenli\u011finden sorumlu komuta merkezinden geldi.<\/p>\n<div id=\"attachment_8527\" style=\"width: 780px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-8527\" class=\"wp-image-8527 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/06\/30170002\/unusual-ways-to-leak-info-pic-3.png\" alt=\"\" width=\"770\" height=\"575\"><p id=\"caption-attachment-8527\" class=\"wp-caption-text\">Stadyum komuta merkezinin ekranlar\u0131ndan birinde g\u00f6r\u00fclen Wi-Fi giri\u015f bilgileri. <a href=\"https:\/\/twitter.com\/TheSmarmyBum\/status\/430055727777214464\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<h2>2. Fitness takip cihazlar\u0131 kullanmak<\/h2>\n<p>Sa\u011fl\u0131\u011f\u0131n\u0131z\u0131 izlemek i\u00e7in kulland\u0131\u011f\u0131n\u0131z cihazlar, \u00e7ok rahatl\u0131kla bir ba\u015fkas\u0131n\u0131n <a href=\"https:\/\/www.kaspersky.com\/blog\/fitness-trackers-privacy\/6480\/\" target=\"_blank\" rel=\"noopener nofollow\">sizi izlemesine<\/a> ve hatta el hareketlerinizden kredi kart\u0131n\u0131z\u0131n PIN numaras\u0131 gibi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/smart-watch-research\/4983\/\" target=\"_blank\" rel=\"noopener\">ki\u015fisel bilgilerinizi ele ge\u00e7irmesine<\/a> olanak sa\u011flayabilir. Elbette, ikinci senaryo pek de ger\u00e7ek\u00e7i de\u011fil.<\/p>\n<p>Fakat gizli tesislerin lokasyonlar\u0131 ile ilgili veri s\u0131z\u0131nt\u0131lar\u0131 ne yaz\u0131k ki ger\u00e7ek hayatta ya\u015fan\u0131yor. \u00d6rne\u011fin, 10 milyondan fazla kullan\u0131c\u0131 taban\u0131na sahip Strava isimli fitness uygulamas\u0131, kullan\u0131c\u0131lar\u0131n ko\u015fu rotalar\u0131n\u0131 <a href=\"https:\/\/www.strava.com\/heatmap#7.00\/-120.90000\/38.36000\/hot\/all\" target=\"_blank\" rel=\"noopener nofollow\">herkese a\u00e7\u0131k bir harita<\/a> \u00fczerinde payla\u015f\u0131yor. Ayn\u0131 zamanda <a href=\"https:\/\/www.bbc.com\/news\/technology-42853072\" target=\"_blank\" rel=\"noopener nofollow\">askeri \u00fcsleri de g\u00f6steriyor<\/a>.<\/p>\n<p>Uygulama her ne kadar rotalar\u0131 merakl\u0131 g\u00f6zlerden gizlemeye ayarlanabilse de, t\u00fcm kullan\u0131c\u0131lar\u0131n bu t\u00fcr \u00f6zellikleri kullanmaya vak\u0131f oldu\u011fu s\u00f6ylenemez.<\/p>\n<div id=\"attachment_8528\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-8528\" class=\"wp-image-8528 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2020\/06\/30171332\/unusual-ways-to-leak-info-pic-4-EN-1024x548.png\" alt=\"\" width=\"1024\" height=\"548\"><p id=\"caption-attachment-8528\" class=\"wp-caption-text\">ABD\u2019nin Afganistan askeri \u00fcss\u00fcndeki askerlerin hareketleri Strava \u0131s\u0131 haritas\u0131nda g\u00f6steriliyor. <a href=\"https:\/\/www.strava.com\/heatmap#12.19\/69.26844\/34.94082\/hot\/all\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a>.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>2018 y\u0131l\u0131nda Pentagon, yeni s\u0131z\u0131nt\u0131lar\u0131n tehdidini \u00f6rnek g\u00f6stererek, sevk edilmi\u015f <a href=\"https:\/\/www.militarytimes.com\/news\/your-military\/2018\/08\/06\/devices-and-apps-that-rely-on-geolocation-restricted-for-deployed-troops\/\" target=\"_blank\" rel=\"noopener nofollow\">ABD askerlerinin fitness takip cihazlar\u0131n\u0131 kullanmas\u0131n\u0131 yasaklad\u0131<\/a>. Elbette, g\u00fcnlerini ABD askeri \u00fcslerinde ge\u00e7irmeyenler i\u00e7in bu \u00e7\u00f6z\u00fcm gere\u011finden fazla bir \u00f6nlem olur. Yine de, fitness uygulaman\u0131z\u0131n g\u00fcvenlik ayarlar\u0131n\u0131 yapmaya vakit ay\u0131rman\u0131z\u0131 \u00f6neriyoruz.<\/p>\n<h2>3. Metaveri yay\u0131nlamak<\/h2>\n<p>S\u0131rlar\u0131n bazen dosya bilgilerinin i\u00e7ine, ba\u015fka deyi\u015fle <a href=\"https:\/\/www.kaspersky.com\/blog\/office-documents-metadata\/14215\/\" target=\"_blank\" rel=\"noopener nofollow\">metaveriye<\/a> gizlenebildi\u011fi kolayl\u0131kla unutulabiliyor (ya da en ba\u015ftan hi\u00e7 bilinmiyor). \u00d6zellikle foto\u011fraflar genellikle \u00e7ekildikleri yerin <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener nofollow\">koordinatlar\u0131n\u0131<\/a> i\u00e7eriyorlar.<\/p>\n<p>2007 y\u0131l\u0131nda, ABD askerleri (burada tekrarlayan davran\u0131\u015f \u00f6r\u00fcnt\u00fcs\u00fc var gibi g\u00f6z\u00fck\u00fcyor) Irak\u2019taki bir \u00fcsse inen helikopterlerin foto\u011fraflar\u0131n\u0131 <a href=\"http:\/\/parliamentstreet.org\/press-room\/2014\/parliament-street-daily-telegraph-2\/\" target=\"_blank\" rel=\"noopener nofollow\">sosyal medyada payla\u015ft\u0131lar<\/a>. Foto\u011fraflar\u0131n metaverileri lokasyonun tam koordinatlar\u0131n\u0131 i\u00e7eriyordu. Hikayenin bir versiyonuna g\u00f6re, bilgiler daha sonradan ABD\u2019nin d\u00f6rt helikopterine mal olan bir d\u00fc\u015fman sald\u0131r\u0131s\u0131nda kullan\u0131ld\u0131.<\/p>\n<h2>4. Sosyal medyada a\u015f\u0131r\u0131 payla\u015f\u0131m yapmak<\/h2>\n<p>Sadece birinin arkada\u015flar\u0131na bakarak baz\u0131 s\u0131rlar\u0131 ele ge\u00e7irebilirsiniz. \u00d6rne\u011fin, e\u011fer belli bir b\u00f6lgedeki sat\u0131\u015f personeli bir \u015firket y\u00f6neticisinin arkada\u015f listesinde <a href=\"https:\/\/hbr.org\/2012\/12\/how-not-to-unwittingly-reveal.html\" target=\"_blank\" rel=\"noopener nofollow\">aniden belirmeye ba\u015flarsa<\/a>, rakipler o \u015firketin yeni pazarlar aray\u0131\u015f\u0131nda oldu\u011fu sonucunu \u00e7\u0131karabilir ve erken davran\u0131p avantaj sa\u011flayabilir.<\/p>\n<p>2011 y\u0131l\u0131nda, Computerworld muhabiri Sharon Machlis LinkedIn\u2019den bilgi toplamak \u00fczerine bir <a href=\"https:\/\/www.computerworld.com\/article\/2469865\/is-your-sensitive-company-info-being-leaked-on-linkedin-.html\" target=\"_blank\" rel=\"noopener nofollow\">deney yapt\u0131<\/a>. Sitede sadece 20 dakika dola\u015farak, Apple\u2019\u0131n \u00e7evrimi\u00e7i forumlar\u0131ndaki moderat\u00f6rlerin say\u0131s\u0131n\u0131, \u015firketin \u0130K altyap\u0131s\u0131n\u0131n ayarlar\u0131n\u0131 ve \u00e7ok daha fazlas\u0131n\u0131 buldu.<\/p>\n<p>Yazar\u0131n da kabul etti\u011fi gibi, ticari s\u0131r gibi bir \u015fey bulmam\u0131\u015ft\u0131, ama Apple daima g\u00fcvenli\u011fe ortalama bir \u015firketten daha fazla \u00f6nem vermekle \u00f6v\u00fcn\u00fcr. Bu arada, bir \u0130K ba\u015fkan yard\u0131mc\u0131s\u0131n\u0131n yine LinkedIn\u2019de s\u0131ralanan g\u00f6revlerinden yola \u00e7\u0131karak herhangi biri \u015firketin <a href=\"https:\/\/www.theregister.com\/2011\/05\/03\/hp_vp_leaks_company_cloud_plans\/\" target=\"_blank\" rel=\"noopener nofollow\">hangi bulut hizmetleri \u00fczerinde \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 bulabilir<\/a>.<\/p>\n<h2>Verileri fark\u0131nda olmayarak ortal\u0131\u011fa sa\u00e7may\u0131 engellemenin yollar\u0131<\/h2>\n<p>\u00c7al\u0131\u015fanlar fark\u0131nda olmayarak \u015firketinizle ilgili pek \u00e7ok bilgiyi payla\u015fabilir. S\u0131rlar\u0131n\u0131z\u0131n herkese a\u00e7\u0131k hale gelmesini \u00f6nlemek i\u00e7in, \u00e7evrimi\u00e7i bilgi payla\u015f\u0131m\u0131 ile ilgili kat\u0131 kurallar koyun ve t\u00fcm \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 \u015fu \u015fekilde bilgilendirin:<\/p>\n<ul>\n<li>Sosyal medyada payla\u015fmak \u00fczere foto\u011fraf ve video \u00e7ekerken, kadraja orada olmamas\u0131 gereken hi\u00e7bir \u015feyin girmedi\u011finden emin olun. Ayn\u0131 \u015fey biri sizi veya ofisinizi foto\u011fraflarken ya da videoya \u00e7ekerken de ge\u00e7erlidir. Gazeteciler bunu umursamaz, ama \u015fifreleriniz internette dola\u015fmaya ba\u015flarsa a\u011f\u0131r bi\u00e7imde cezaland\u0131r\u0131labilirsiniz. \u00c7ekimlerinizi bu ama\u00e7 i\u00e7in ayr\u0131lm\u0131\u015f alanlarda yap\u0131n. B\u00f6yle alanlar yoksa, en az\u0131ndan \u00e7ekim yapmadan \u00f6nce duvarlar\u0131 ve masalar\u0131 kontrol edin.<\/li>\n<li>Ayr\u0131ca, g\u00f6r\u00fcnt\u00fcl\u00fc aramalarda, g\u00f6r\u00fc\u015ft\u00fc\u011f\u00fcn\u00fcz ki\u015filer i\u015f arkada\u015flar\u0131n\u0131z ya da ortaklar\u0131n\u0131z dahi olsa, kar\u015f\u0131 taraf\u0131n arkan\u0131zdaki duvarda ne g\u00f6rd\u00fc\u011f\u00fcne dikkat edin.<\/li>\n<li>Hassas ki\u015fisel ve i\u015f ba\u011flant\u0131lar\u0131n\u0131z\u0131 sosyal medyadan gizleyin. Rakiplerin, doland\u0131r\u0131c\u0131lar\u0131n ve di\u011fer k\u00f6t\u00fc niyetli kimselerin bu bilgileri size kar\u015f\u0131 kullanabileceklerini unutmay\u0131n.<\/li>\n<li>Bir dosya yay\u0131nlamadan \u00f6nce, metaverilerini silin. Bunu Windows bilgisayarlarda dosya \u00f6zelliklerinden yapabilirsiniz; ak\u0131ll\u0131 telefonlarda ise bunun i\u00e7in \u00f6zel uygulamalar var. Kar\u015f\u0131 taraf bir foto\u011fraf\u0131n nerede \u00e7ekildi\u011fini veya bir belgenin kimin bilgisayar\u0131nda yarat\u0131ld\u0131\u011f\u0131n\u0131 bilmek zorunda de\u011fildir.<\/li>\n<li>B\u00f6b\u00fcrlenmeden \u00f6nce, i\u015f ba\u015far\u0131lar\u0131n\u0131n asl\u0131nda ticari s\u0131rlar olup olmad\u0131\u011f\u0131n\u0131 tart\u0131n. En az\u0131ndan, zaferlerinizi en ince ayr\u0131nt\u0131s\u0131na kadar g\u00f6stermeyin.<\/li>\n<\/ul>\n<p>\u00c7al\u0131\u015fanlar hangi bilgilerin gizli oldu\u011funu ve bu bilgileri nas\u0131l kullanaca\u011f\u0131n\u0131 net olarak anlamal\u0131d\u0131r. <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/security-awareness?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksa___\" target=\"_blank\" rel=\"noopener\">Otomatik g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131 platformumuz<\/a> bu konuda e\u011fitim vermektedir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Hassas bilgileri istemeden kamuya a\u00e7\u0131k alanlara s\u0131zd\u0131rman\u0131n ne kadar da kolay oldu\u011funa dair birka\u00e7 hikaye.<\/p>\n","protected":false},"author":2049,"featured_media":8522,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,994,1284,1194],"tags":[500,744,2224,561,717,848],"class_list":{"0":"post-8521","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-privacy","9":"category-tips","10":"category-business","11":"tag-gizlilik","12":"tag-guvenlik","13":"tag-metaveri","14":"tag-sifreler","15":"tag-sosyal-aglar","16":"tag-veri-sizintisi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/unusual-ways-to-leak-info\/8521\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/unusual-ways-to-leak-info\/21489\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/unusual-ways-to-leak-info\/16958\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/unusual-ways-to-leak-info\/8417\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/unusual-ways-to-leak-info\/22692\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/unusual-ways-to-leak-info\/20787\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/unusual-ways-to-leak-info\/19167\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/unusual-ways-to-leak-info\/23416\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/unusual-ways-to-leak-info\/22121\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/unusual-ways-to-leak-info\/28656\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/unusual-ways-to-leak-info\/36049\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/unusual-ways-to-leak-info\/15183\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/unusual-ways-to-leak-info\/15755\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/unusual-ways-to-leak-info\/13637\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/unusual-ways-to-leak-info\/24606\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/unusual-ways-to-leak-info\/11663\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/unusual-ways-to-leak-info\/28755\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/unusual-ways-to-leak-info\/25629\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/unusual-ways-to-leak-info\/22531\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/unusual-ways-to-leak-info\/27772\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/unusual-ways-to-leak-info\/27613\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/veri-sizintisi\/","name":"veri s\u0131z\u0131nt\u0131s\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2049"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8521"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8521\/revisions"}],"predecessor-version":[{"id":8530,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8521\/revisions\/8530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8522"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}