{"id":171,"date":"2025-11-21T22:13:31","date_gmt":"2025-11-21T22:13:31","guid":{"rendered":"https:\/\/www.aliburaksan.com\/blog\/?p=171"},"modified":"2025-11-21T22:13:32","modified_gmt":"2025-11-21T22:13:32","slug":"phishing-kurbani-olma-siber-guvenlik-rehberi","status":"publish","type":"post","link":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/","title":{"rendered":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi"},"content":{"rendered":"<style>\n        body { font-family: 'Segoe UI', Tahoma, Geneva, Verdana, sans-serif; line-height: 1.6; color: #333; margin: 20px; background-color: #f8f8f8; }<br \/>\n        h1, h2, h3 { color: #2c3e50; }<br \/>\n        h2 { border-bottom: 2px solid #3498db; padding-bottom: 10px; margin-top: 30px; }<br \/>\n        h3 { color: #34495e; margin-top: 20px; }<br \/>\n        p { margin-bottom: 15px; }<br \/>\n        ul { list-style-type: disc; margin-left: 20px; margin-bottom: 15px; }<br \/>\n        li { margin-bottom: 8px; }<br \/>\n        pre { background-color: #ecf0f1; padding: 15px; border-left: 5px solid #3498db; overflow-x: auto; margin-bottom: 20px; }<br \/>\n        code { font-family: 'Consolas', 'Monaco', monospace; font-size: 0.9em; color: #c0392b; }<br \/>\n        strong { color: #e74c3c; }<br \/>\n    <\/style>\n<h1>Siber G\u00fcvenlik Fark\u0131ndal\u0131\u011f\u0131: Phishing Sald\u0131r\u0131lar\u0131ndan Korunma &#8211; IT Uzman\u0131ndan Pratik \u00c7\u00f6z\u00fcmler<\/h1>\n<p>Merhaba millet!\u00a0 Gelin bug\u00fcn hepimizin ba\u015f\u0131na bela olabilecek, cebimizdeki paray\u0131, \u015firketimizin itibar\u0131n\u0131 veya ki\u015fisel verilerimizi hedef alan sinsi bir d\u00fc\u015fmandan, yani <strong>Phishing (Oltalama) Sald\u0131r\u0131lar\u0131<\/strong>&#8216;ndan nas\u0131l korunaca\u011f\u0131m\u0131za dair pratik ipu\u00e7lar\u0131 payla\u015fay\u0131m. Bu yaz\u0131, teknik terimlere bo\u011fulmadan, ama i\u015fin mant\u0131\u011f\u0131n\u0131 kavrayarak sizi daha g\u00fcvenli hale getirme amac\u0131 ta\u015f\u0131yor.<\/p>\n<h2>1. Giri\u015f: Bu Oltaya Neden D\u00fc\u015f\u00fcyoruz?<\/h2>\n<p>G\u00fcn\u00fcm\u00fcz dijital d\u00fcnyas\u0131nda siber g\u00fcvenlik art\u0131k sadece b\u00fcy\u00fck \u015firketlerin veya devletlerin konusu de\u011fil, hepimizin meselesi. Sabah kahvemizi yudumlarken gelen bir e-posta, sosyal medyada kar\u015f\u0131la\u015ft\u0131\u011f\u0131m\u0131z bir link ya da telefona gelen bir SMS&#8230; Bir anl\u0131k dikkatsizlik, bir saniyelik dalg\u0131nl\u0131k, b\u00fct\u00fcn hayat\u0131m\u0131z\u0131 alt\u00fcst edebilir. \u0130\u015fte Phishing sald\u0131r\u0131lar\u0131 tam da bu insani zaafiyetler \u00fczerine kurulu bir siber tehdit t\u00fcr\u00fc.<\/p>\n<p>Peki nedir bu Phishing? En basit tabirle, siber korsanlar\u0131n, kendilerini g\u00fcvenilir bir kurum (bankan\u0131z, kargo \u015firketiniz, bir e-ticaret sitesi, hatta kendi IT departman\u0131n\u0131z!) gibi g\u00f6stererek sizi kand\u0131rmaya \u00e7al\u0131\u015ft\u0131\u011f\u0131, genellikle e-posta, SMS veya anl\u0131k mesajla\u015fma uygulamalar\u0131 arac\u0131l\u0131\u011f\u0131yla yap\u0131lan doland\u0131r\u0131c\u0131l\u0131k giri\u015fimidir. Ama\u00e7lar\u0131 m\u0131? \u015eifreleriniz, kredi kart\u0131 bilgileriniz, kimlik numaralar\u0131n\u0131z gibi kritik verilerinizi ele ge\u00e7irmek veya cihaz\u0131n\u0131za k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131rmak. Son zamanlarda o kadar inceldi ki bu sald\u0131r\u0131lar, bazen kendi \u015firketinizin CEO&#8217;sundan geliyormu\u015f gibi g\u00f6r\u00fcnen e-postalarla bile kar\u015f\u0131la\u015fabiliyoruz. Tecr\u00fcbeyle sabit: &#8220;K\u00fc\u00e7\u00fck bir hata, b\u00fcy\u00fck bir felaket&#8221; senaryolar\u0131n\u0131 \u00e7ok g\u00f6rd\u00fcm.<\/p>\n<p>Bu sald\u0131r\u0131lar neden bu kadar etkili? \u00c7\u00fcnk\u00fc insan fakt\u00f6r\u00fcn\u00fc hedef al\u0131yorlar. Merak, korku, aciliyet hissi veya sadece bir anl\u0131k dikkatsizlik&#8230; Hepimiz bu duygulara sahibiz. Amac\u0131m, bu yaz\u0131yla size bu duygulara kap\u0131lmadan \u00f6nce bir saniye durup d\u00fc\u015f\u00fcnme al\u0131\u015fkanl\u0131\u011f\u0131n\u0131 kazand\u0131rmak ve pratik kontrollerle tuza\u011fa d\u00fc\u015fmenizi engellemek.<\/p>\n<h2>2. Teknik Detaylar: Phishing Perde Arkas\u0131nda Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131 sadece bir e-postadan ibaret de\u011fil. Arkas\u0131nda genellikle sofistike planlar ve teknik aldatmacalar yatar. Bir siber korsan, hedefini belirler, g\u00fcvenilir bir markan\u0131n taklidini yapar, aldat\u0131c\u0131 bir e-posta veya mesaj haz\u0131rlar ve sonra kurban\u0131n tuza\u011fa d\u00fc\u015fmesini bekler. S\u00fcre\u00e7 genellikle \u015fu ad\u0131mlarla ilerler:<\/p>\n<ul>\n<li><strong>Lure (Yem):<\/strong> Bir e-posta veya mesaj (\u00f6rne\u011fin, &#8220;Hesab\u0131n\u0131z ask\u0131ya al\u0131nd\u0131&#8221;, &#8220;Kargonuz yolda&#8221;, &#8220;\u00d6deme bilginizi g\u00fcncelleyin&#8221;, &#8220;Hediye kazand\u0131n\u0131z!&#8221;).<\/li>\n<li><strong>Exploitation (S\u00f6m\u00fcr\u00fc):<\/strong> Mesajdaki zararl\u0131 bir ba\u011flant\u0131ya t\u0131klama veya ekteki dosyay\u0131 a\u00e7ma.<\/li>\n<li><strong>Payload (Y\u00fck):<\/strong> Kimlik av\u0131 sitesine y\u00f6nlendirilme (\u015fifre \u00e7alma), k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirme veya cihaz\u0131n kontrol\u00fcn\u00fcn ele ge\u00e7irilmesi.<\/li>\n<\/ul>\n<h3>Phishing \u00c7e\u015fitleri: Hepsi Ayn\u0131 De\u011fil!<\/h3>\n<p>Phishing&#8217;in de kendi i\u00e7inde t\u00fcrleri var, bilmek sizi bir ad\u0131m \u00f6ne ge\u00e7irir:<\/p>\n<ul>\n<li><strong>Standart E-posta Phishing:<\/strong> En yayg\u0131n olan\u0131d\u0131r. Genellikle binlerce ki\u015fiye ayn\u0131 anda g\u00f6nderilen, jenerik e-postalard\u0131r.<\/li>\n<li><strong>Spear Phishing (Hedefe Y\u00f6nelik Oltalama):<\/strong> Daha tehlikelidir \u00e7\u00fcnk\u00fc belirli bir ki\u015fiyi veya grubu hedefler. Sosyal m\u00fchendislik ve a\u00e7\u0131k kaynak istihbarat\u0131 (OSINT) kullan\u0131larak ki\u015fiye \u00f6zel hale getirilir. \u00d6rne\u011fin, sizin \u015firketinizdeki bir departmandan veya tan\u0131d\u0131\u011f\u0131n\u0131z birinden geliyormu\u015f gibi g\u00f6r\u00fcnebilir.<\/li>\n<li><strong>Whaling (Balina Avc\u0131l\u0131\u011f\u0131):<\/strong> Spear Phishing&#8217;in \u00fcst d\u00fczey y\u00f6neticileri (CEO, CFO gibi) hedefleyen versiyonudur. Ama\u00e7, b\u00fcy\u00fck mebla\u011flarda para transferi veya hassas \u015firket bilgilerini ele ge\u00e7irmektir.<\/li>\n<li><strong>Smishing (SMS Phishing):<\/strong> Telefonunuza SMS yoluyla gelen oltalama mesajlar\u0131d\u0131r. Genellikle k\u0131sa URL&#8217;ler i\u00e7erirler. &#8220;Bankac\u0131l\u0131k uygulaman\u0131z g\u00fcncellendi, t\u0131klay\u0131n.&#8221; gibi.<\/li>\n<li><strong>Vishing (Voice Phishing):<\/strong> Telefon aramas\u0131 yoluyla yap\u0131lan oltalama. Kendilerini banka g\u00f6revlisi, polis veya teknik destek gibi tan\u0131tabilirler.<\/li>\n<li><strong>BEC (Business Email Compromise):<\/strong> \u0130\u015f e-postas\u0131 g\u00fcvenli\u011finin ihlali. Genellikle bir \u00e7al\u0131\u015fan\u0131n e-posta hesab\u0131n\u0131n ele ge\u00e7irilmesi ve i\u00e7eriden sahte talimatlar g\u00f6nderilmesiyle b\u00fcy\u00fck finansal kay\u0131plara yol a\u00e7abilir.<\/li>\n<\/ul>\n<h3>G\u00f6zden Ka\u00e7\u0131rmaman\u0131z Gereken Teknik \u0130\u015faretler:<\/h3>\n<ul>\n<li><strong>G\u00f6nderen Adresi:<\/strong> Bir e-posta geldi\u011finde, ilk bakaca\u011f\u0131n\u0131z yer g\u00f6nderenin e-posta adresi olmal\u0131. Kurumlar\u0131n genellikle resmi domainleri olur (\u00f6rne\u011fin, <code>@banka.com<\/code>). E\u011fer gelen adres <code>@banka-destek.com<\/code>, <code>@banqa.net<\/code> veya <code>@gmail.com<\/code> gibi \u015f\u00fcpheli veya yaz\u0131m hatal\u0131ysa, bu alarm zillerini \u00e7ald\u0131rmal\u0131. Bazen g\u00f6rsel olarak &#8220;banka.com&#8221; yazar ama mouse ile \u00fczerine geldi\u011finizde farkl\u0131 bir adres g\u00f6r\u00fcrs\u00fcn\u00fcz.<\/li>\n<li><strong>Ba\u011flant\u0131lar (Linkler):<\/strong> Bir linke t\u0131klamadan \u00f6nce, fare imlecini linkin \u00fczerine getirin (t\u0131klamay\u0131n!) ve sol alt k\u00f6\u015fede veya bir ipucu kutucu\u011funda beliren URL&#8217;yi kontrol edin. Resmi siteye mi gidiyor, yoksa alakas\u0131z bir domaine mi? K\u0131salt\u0131lm\u0131\u015f URL&#8217;lere (bit.ly, tinyurl vb.) her zaman \u015f\u00fcpheyle yakla\u015f\u0131n.<\/li>\n<li><strong>Ekler:<\/strong> Beklemedi\u011finiz veya \u015f\u00fcpheli g\u00f6r\u00fcnen e-postalardaki hi\u00e7bir eki a\u00e7may\u0131n. \u00d6zellikle <code>.exe<\/code>, <code>.zip<\/code>, <code>.rar<\/code>, <code>.docm<\/code> (makro i\u00e7eren), <code>.js<\/code> gibi dosya uzant\u0131lar\u0131na dikkat edin.<\/li>\n<li><strong>Dilbilgisi ve Yaz\u0131m Hatalar\u0131:<\/strong> Kurumsal e-postalar genellikle profesyonel bir dil kullan\u0131r. A\u015f\u0131r\u0131 yaz\u0131m veya dilbilgisi hatalar\u0131 i\u00e7eren mesajlar \u015f\u00fcpheli olabilir. (Ama unutmay\u0131n, bazen \u00e7ok iyi haz\u0131rlanm\u0131\u015f phishing e-postalar\u0131 da mevcut!)<\/li>\n<li><strong>Aciliyet ve Tehdit:<\/strong> &#8220;Hesab\u0131n\u0131z hemen kapat\u0131lacak!&#8221;, &#8220;Cezay\u0131 \u00f6demezseniz yasal i\u015flem ba\u015flat\u0131lacak!&#8221; gibi aciliyet veya tehdit i\u00e7eren ifadelerle sizi korkutarak h\u0131zl\u0131 karar vermeye zorlamaya \u00e7al\u0131\u015f\u0131rlar.<\/li>\n<li><strong>Genel Hitap:<\/strong> E\u011fer e-posta size ki\u015fisel olarak de\u011fil, &#8220;De\u011ferli M\u00fc\u015fterimiz&#8221;, &#8220;Say\u0131n \u00dcyemiz&#8221; gibi genel bir ifadeyle hitap ediyorsa, bu da bir ipucu olabilir.<\/li>\n<li><strong>HTTPS G\u00fcvenli\u011fi:<\/strong> Bir web sitesine girdi\u011finizde adres \u00e7ubu\u011funda &#8220;https:\/\/&#8221; ve bir kilit simgesi olmas\u0131 o sitenin g\u00fcvenli oldu\u011fu anlam\u0131na <strong>gelmez<\/strong>. Sadece site ile aran\u0131zdaki ileti\u015fimin \u015fifreli oldu\u011funu g\u00f6sterir. Yani bir phishing sitesi de HTTPS kullanabilir. Her zaman domain ad\u0131n\u0131 kontrol edin!<\/li>\n<\/ul>\n<h2>3. Ad\u0131m Ad\u0131m Uygulama \/ Pratik Kontroller<\/h2>\n<p>\u015eimdi gelelim i\u015fin en can al\u0131c\u0131 k\u0131sm\u0131na: Kar\u015f\u0131n\u0131za \u015f\u00fcpheli bir e-posta veya mesaj geldi\u011finde ne yapmal\u0131s\u0131n\u0131z? Bu ad\u0131mlar\u0131 izlemek sizi b\u00fcy\u00fck \u00f6l\u00e7\u00fcde koruyacakt\u0131r:<\/p>\n<h3>Ad\u0131m 1: G\u00f6ndereni Do\u011frula &#8211; Email Headerlar\u0131 Bir Hazinedir!<\/h3>\n<p>E-postan\u0131n g\u00f6r\u00fcnen g\u00f6nderen adresi sizi yan\u0131ltabilir. Ger\u00e7ek kayna\u011f\u0131 g\u00f6rmek i\u00e7in e-postan\u0131n &#8220;kaynak kodunu&#8221; veya &#8220;ba\u015fl\u0131k bilgilerini&#8221; (email headers) incelemeyi \u00f6\u011frenin. Bu biraz teknik gelebilir ama \u00e7ok basit ad\u0131mlarla \u00e7o\u011fu e-posta uygulamas\u0131nda ula\u015fabilirsiniz:<\/p>\n<ul>\n<li><strong>Gmail:<\/strong> E-postay\u0131 a\u00e7\u0131n, sa\u011f \u00fcstteki \u00fc\u00e7 noktaya t\u0131klay\u0131n, &#8220;Orijinali g\u00f6ster&#8221; veya &#8220;Show original&#8221; se\u00e7ene\u011fini se\u00e7in.<\/li>\n<li><strong>Outlook (Web):<\/strong> E-postay\u0131 a\u00e7\u0131n, sa\u011f \u00fcstteki \u00fc\u00e7 noktaya t\u0131klay\u0131n, &#8220;View message details&#8221; veya &#8220;\u0130leti ayr\u0131nt\u0131lar\u0131n\u0131 g\u00f6r\u00fcnt\u00fcle&#8221; se\u00e7ene\u011fini se\u00e7in.<\/li>\n<li><strong>Outlook (Masa\u00fcst\u00fc):<\/strong> E-postay\u0131 \u00e7ift t\u0131klayarak a\u00e7\u0131n. &#8220;Dosya&#8221; (File) &gt; &#8220;Bilgi&#8221; (Info) &gt; &#8220;\u00d6zellikler&#8221; (Properties) se\u00e7ene\u011fine t\u0131klay\u0131n. &#8220;\u0130nternet Ba\u015fl\u0131klar\u0131&#8221; (Internet Headers) b\u00f6l\u00fcm\u00fcn\u00fc g\u00f6receksiniz.<\/li>\n<\/ul>\n<p>Burada <code>From:<\/code>, <code>Return-Path:<\/code> ve <code>Received: from<\/code> sat\u0131rlar\u0131na dikkat edin. Gelen domain ile g\u00f6r\u00fcnen domain aras\u0131nda bir tutars\u0131zl\u0131k varsa, bilin ki ortada bir bit yeni\u011fi var.<\/p>\n<pre><code>\n    \/\/ \u015e\u00fcpheli bir e-postadan \u00f6rnek header par\u00e7ac\u0131\u011f\u0131\n    From: \"Banka Destek\" &lt;destek@banqa-online.com&gt; \/\/ G\u00f6r\u00fcnen adres\n    Return-Path: &lt;noreply@siberkorsan.xyz&gt; \/\/ Ger\u00e7ek g\u00f6nderici burada!\n    Received: from mail.siberkorsan.xyz (mail.siberkorsan.xyz [X.X.X.X])\n        by mailserver.kurumunuz.com (Postfix) with ESMTP id ABCDEF123\n        for &lt;kurban@kurumunuz.com&gt;; Tue, 23 Nov 2023 10:30:00 +0300 (TRT)\n    <\/code><\/pre>\n<p>Yukar\u0131daki \u00f6rnekte, e-posta g\u00f6r\u00fcnen &#8220;Banka Destek&#8221; adresinden gelse de, <code>Return-Path<\/code> ve <code>Received: from<\/code> sat\u0131rlar\u0131 e-postan\u0131n asl\u0131nda <code>siberkorsan.xyz<\/code> domaininden geldi\u011fini a\u00e7\u0131k\u00e7a g\u00f6steriyor. Bu kesinlikle bir phishing giri\u015fimi!<\/p>\n<h3>Ad\u0131m 2: Linkleri G\u00fcvenle Kontrol Et &#8211; Asla Direkt T\u0131klama!<\/h3>\n<p>Bir ba\u011flant\u0131 m\u0131 var? Asla direkt t\u0131klamay\u0131n. Fareyi \u00fczerine getirin ve \u00e7\u0131kan URL&#8217;yi kontrol edin. E\u011fer \u015f\u00fcpheniz varsa:<\/p>\n<ul>\n<li>Google&#8217;da &#8220;URL Taray\u0131c\u0131&#8221; veya &#8220;Link Checker&#8221; diye arat\u0131n. VirusTotal gibi servisler, \u015f\u00fcpheli linkleri analiz edip size g\u00fcvenli olup olmad\u0131\u011f\u0131n\u0131 s\u00f6yleyebilir.<\/li>\n<li>Ger\u00e7ek kuruma ait oldu\u011funu d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz web sitesini taray\u0131c\u0131n\u0131zdan kendiniz yazarak ziyaret edin. Oradan hesab\u0131n\u0131za giri\u015f yap\u0131n ve herhangi bir bildirim veya uyar\u0131 olup olmad\u0131\u011f\u0131n\u0131 kontrol edin.<\/li>\n<li>\u00d6rnek: Size &#8220;banka.com\/guvenlik\/guncelle&#8221; gibi g\u00f6r\u00fcnen bir link yerine, mouse ile \u00fczerine geldi\u011finizde &#8220;banka.co\/destek\/login.php?id=&#8230;&#8221; gibi alakas\u0131z bir \u015fey g\u00f6r\u00fcyorsan\u0131z, uzak durun!<\/li>\n<\/ul>\n<h3>Ad\u0131m 3: \u00c7ok Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (MFA\/2FA) Kullan!<\/h3>\n<p>Belki de phishing&#8217;e kar\u015f\u0131 en g\u00fc\u00e7l\u00fc savunmalardan biri budur. \u015eifreniz ele ge\u00e7irilse bile, sald\u0131rgan MFA olmadan hesab\u0131n\u0131za eri\u015femez. Bankac\u0131l\u0131k, e-posta, sosyal medya hesaplar\u0131n\u0131zda mutlaka MFA&#8217;y\u0131 etkinle\u015ftirin. Telefonunuza gelen kod, parmak izi veya biyometrik do\u011frulama size ikinci bir g\u00fcvenlik katman\u0131 sa\u011flar.<\/p>\n<h3>Ad\u0131m 4: G\u00fc\u00e7l\u00fc ve Benzersiz \u015eifreler Kullan!<\/h3>\n<p>Her hesap i\u00e7in farkl\u0131 ve karma\u015f\u0131k \u015fifreler kullan\u0131n. Bir \u015fifre y\u00f6neticisi (LastPass, Bitwarden vb.) kullanarak bu i\u015fi kolayla\u015ft\u0131rabilirsiniz. Bu, bir hesab\u0131n\u0131z ele ge\u00e7irilse bile di\u011ferlerinin g\u00fcvende kalmas\u0131n\u0131 sa\u011flar.<\/p>\n<h3>Ad\u0131m 5: Yaz\u0131l\u0131mlar\u0131n\u0131z\u0131 G\u00fcncel Tutun!<\/h3>\n<p>\u0130\u015fletim sisteminiz, web taray\u0131c\u0131n\u0131z ve antivir\u00fcs programlar\u0131n\u0131z\u0131n g\u00fcncel oldu\u011fundan emin olun. G\u00fcncellemeler, bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131r ve sizi yeni tehditlere kar\u015f\u0131 korur.<\/p>\n<h3>Ad\u0131m 6: \u015e\u00fcpheli Durumlar\u0131 Bildir!<\/h3>\n<p>E\u011fer bir phishing giri\u015fimiyle kar\u015f\u0131la\u015ft\u0131\u011f\u0131n\u0131z\u0131 d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, bunu \u015firketinizin IT departman\u0131na veya e-posta servis sa\u011flay\u0131c\u0131n\u0131za bildirin. Bu, ba\u015fkalar\u0131n\u0131n da korunmas\u0131na yard\u0131mc\u0131 olur.<\/p>\n<h2>4. S\u0131k Yap\u0131lan Hatalar: Neden H\u00e2l\u00e2 Oltalara Tak\u0131l\u0131yoruz?<\/h2>\n<p>\u00c7evremden g\u00f6zlemledi\u011fim ve kullan\u0131c\u0131lar\u0131n en \u00e7ok d\u00fc\u015ft\u00fc\u011f\u00fc hatalar \u015funlar:<\/p>\n<ul>\n<li><strong>Panikleme ve Aciliyet Hissi:<\/strong> &#8220;Hemen t\u0131klamazsan\u0131z hesab\u0131n\u0131z kapat\u0131lacak!&#8221; t\u00fcr\u00fc mesajlara an\u0131nda tepki vermek. Durup d\u00fc\u015f\u00fcnmek yerine aceleci davranmak en b\u00fcy\u00fck d\u00fc\u015fman\u0131m\u0131z.<\/li>\n<li><strong>Merak:<\/strong> &#8220;Bana \u00f6zel bir video&#8221;, &#8220;Foto\u011fraflar\u0131n\u0131z\u0131 kim g\u00f6r\u00fcnt\u00fcledi?&#8221; gibi merak uyand\u0131r\u0131c\u0131 ba\u015fl\u0131klar y\u00fcz\u00fcnden linklere t\u0131klamak.<\/li>\n<li><strong>G\u00fcvenilir Marka Alg\u0131s\u0131:<\/strong> Bankan\u0131z\u0131n, kargo \u015firketinizin logosunu g\u00f6r\u00fcnce an\u0131nda g\u00fcven duymak ve di\u011fer kontrolleri yapmay\u0131 atlamak. Unutmay\u0131n, logo kopyalamak \u00e7ok kolay.<\/li>\n<li><strong>\u015eifreleri Tekrar Kullanma:<\/strong> Bir\u00e7ok sitede ayn\u0131 \u015fifreyi kullanmak, bir site ele ge\u00e7irilirse di\u011fer t\u00fcm hesaplar\u0131n\u0131z\u0131n da tehlikeye girmesine neden olur.<\/li>\n<li><strong>Antivir\u00fcs\u00fcn Her \u015eeyi Yakalayaca\u011f\u0131n\u0131 D\u00fc\u015f\u00fcnmek:<\/strong> Antivir\u00fcs programlar\u0131 koruyucudur ama %100 de\u011fil. \u0130nsan fakt\u00f6r\u00fc en \u00f6nemli g\u00fcvenlik katman\u0131d\u0131r.<\/li>\n<li><strong>&#8220;Bana Ne Olur Ki?&#8221; D\u00fc\u015f\u00fcncesi:<\/strong> &#8220;Benim bilgilerim kimin ne i\u015fine yarar?&#8221; diye d\u00fc\u015f\u00fcnerek g\u00fcvenlik kurallar\u0131n\u0131 ihmal etmek. Herkesin bilgisi de\u011ferlidir ve bir \u015fekilde kullan\u0131labilir.<\/li>\n<li><strong>Bildirimleri Ciddiye Almamak:<\/strong> \u015e\u00fcpheli e-postalar\u0131 &#8220;\u00f6nemsiz&#8221; diye i\u015faretleyip ge\u00e7mek yerine, ilgili birimlere bildirmemek.<\/li>\n<\/ul>\n<h2>5. Sonu\u00e7: Dikkat, D\u00fc\u015f\u00fcnce ve Al\u0131\u015fkanl\u0131k<\/h2>\n<p>Phishing sald\u0131r\u0131lar\u0131, teknoloji ne kadar geli\u015firse geli\u015fsin, insan zay\u0131fl\u0131klar\u0131n\u0131 hedeflemeye devam edecek. Bu y\u00fczden en iyi savunma hatt\u0131, <strong>sizin fark\u0131ndal\u0131\u011f\u0131n\u0131z ve ele\u015ftirel d\u00fc\u015f\u00fcnme becerinizdir.<\/strong> Size az \u00f6nce anlatt\u0131\u011f\u0131m ad\u0131mlar, asl\u0131nda g\u00fcnl\u00fck ya\u015fam\u0131n\u0131zda kolayca uygulayabilece\u011finiz basit kontroller. Bu kontrolleri bir al\u0131\u015fkanl\u0131k haline getirdi\u011finizde, bir phishing e-postas\u0131 veya mesaj\u0131 kar\u015f\u0131n\u0131za \u00e7\u0131kt\u0131\u011f\u0131nda otomatik olarak alarm zilleriniz \u00e7almaya ba\u015flayacak.<\/p>\n<p>Unutmay\u0131n, hi\u00e7bir banka, kurum veya IT departman\u0131 sizden e-posta veya SMS arac\u0131l\u0131\u011f\u0131yla \u015fifrenizi veya kredi kart\u0131 bilgilerinizi <strong>talep etmez<\/strong>. E\u011fer b\u00f6yle bir taleple kar\u015f\u0131la\u015f\u0131rsan\u0131z, \u015f\u00fcphelenmekte hakl\u0131s\u0131n\u0131zd\u0131r. En ufak bir \u015f\u00fcphenizde do\u011frudan ilgili kurumla resmi ileti\u015fim kanallar\u0131ndan (web sitesindeki telefon numaras\u0131, mobil uygulama vb.) ileti\u015fime ge\u00e7in. Asla \u015f\u00fcpheli e-postadaki numara veya linkleri kullanmay\u0131n.<\/p>\n<p>Siber g\u00fcvenlik bir yolculuktur, bir var\u0131\u015f noktas\u0131 de\u011fil. S\u00fcrekli \u00f6\u011frenmeli, kendinizi g\u00fcncellemeli ve en \u00f6nemlisi dikkatli olmal\u0131s\u0131n\u0131z. Hepimiz zaman zaman dalg\u0131n olabiliyoruz, ancak bu pratik bilgilerle o dalg\u0131nl\u0131k anlar\u0131nda bile g\u00fcvende kalma \u015fans\u0131n\u0131z\u0131 art\u0131r\u0131rs\u0131n\u0131z. Kendinizi ve bilgilerinizi korumak sizin elinizde. G\u00fcvende kal\u0131n, dikkatli olun!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing sald\u0131r\u0131lar\u0131 tehdidiyle kar\u015f\u0131la\u015fmay\u0131n! Siber g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131yla verilerinizi nas\u0131l korursunuz? Etkili korunma yollar\u0131n\u0131 ke\u015ffedin.<\/p>\n","protected":false},"author":1,"featured_media":187,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[30,26,28],"class_list":["post-171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sistem-donanim","tag-mail","tag-phishing","tag-social-engineering"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean\" \/>\n<meta property=\"og:description\" content=\"Phishing sald\u0131r\u0131lar\u0131 tehdidiyle kar\u015f\u0131la\u015fmay\u0131n! Siber g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131yla verilerinizi nas\u0131l korursunuz? Etkili korunma yollar\u0131n\u0131 ke\u015ffedin.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\" \/>\n<meta property=\"og:site_name\" content=\"Ali Burak \u015ean\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-21T22:13:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-21T22:13:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"abs_administrator45_\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"abs_administrator45_\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\"},\"author\":{\"name\":\"abs_administrator45_\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"headline\":\"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi\",\"datePublished\":\"2025-11-21T22:13:31+00:00\",\"dateModified\":\"2025-11-21T22:13:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\"},\"wordCount\":2045,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"image\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png\",\"keywords\":[\"mail\",\"phishing\",\"social engineering\"],\"articleSection\":[\"Sistem &amp; Donan\u0131m\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\",\"name\":\"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean\",\"isPartOf\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png\",\"datePublished\":\"2025-11-21T22:13:31+00:00\",\"dateModified\":\"2025-11-21T22:13:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png\",\"contentUrl\":\"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png\",\"width\":2560,\"height\":1725},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.aliburaksan.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#website\",\"url\":\"https:\/\/www.aliburaksan.com\/blog\/\",\"name\":\"Dijital Nab\u0131z \u2013 IT Haberleri\",\"description\":\"IT, Sistem Y\u00f6netimi ve Teknoloji G\u00fcnl\u00fc\u011f\u00fc\",\"publisher\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aliburaksan.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2\",\"name\":\"abs_administrator45_\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g\",\"caption\":\"abs_administrator45_\"},\"logo\":{\"@id\":\"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/www.aliburaksan.com\/blog\"],\"url\":\"https:\/\/www.aliburaksan.com\/blog\/author\/abs_administrator45_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/","og_locale":"tr_TR","og_type":"article","og_title":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean","og_description":"Phishing sald\u0131r\u0131lar\u0131 tehdidiyle kar\u015f\u0131la\u015fmay\u0131n! Siber g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131yla verilerinizi nas\u0131l korursunuz? Etkili korunma yollar\u0131n\u0131 ke\u015ffedin.","og_url":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/","og_site_name":"Ali Burak \u015ean","article_published_time":"2025-11-21T22:13:31+00:00","article_modified_time":"2025-11-21T22:13:32+00:00","og_image":[{"width":2560,"height":1725,"url":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png","type":"image\/png"}],"author":"abs_administrator45_","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"abs_administrator45_","Tahmini okuma s\u00fcresi":"9 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#article","isPartOf":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/"},"author":{"name":"abs_administrator45_","@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"headline":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi","datePublished":"2025-11-21T22:13:31+00:00","dateModified":"2025-11-21T22:13:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/"},"wordCount":2045,"commentCount":0,"publisher":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"image":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png","keywords":["mail","phishing","social engineering"],"articleSection":["Sistem &amp; Donan\u0131m"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/","url":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/","name":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi - Ali Burak \u015ean","isPartOf":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage"},"image":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png","datePublished":"2025-11-21T22:13:31+00:00","dateModified":"2025-11-21T22:13:32+00:00","breadcrumb":{"@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#primaryimage","url":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png","contentUrl":"https:\/\/www.aliburaksan.com\/blog\/wp-content\/uploads\/2025\/11\/phishing-konu-basligi-scaled.png","width":2560,"height":1725},{"@type":"BreadcrumbList","@id":"https:\/\/www.aliburaksan.com\/blog\/phishing-kurbani-olma-siber-guvenlik-rehberi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.aliburaksan.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing Kurban\u0131 Olma! Siber G\u00fcvenlik Rehberi"}]},{"@type":"WebSite","@id":"https:\/\/www.aliburaksan.com\/blog\/#website","url":"https:\/\/www.aliburaksan.com\/blog\/","name":"Dijital Nab\u0131z \u2013 IT Haberleri","description":"IT, Sistem Y\u00f6netimi ve Teknoloji G\u00fcnl\u00fc\u011f\u00fc","publisher":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aliburaksan.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":["Person","Organization"],"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/ddc80da203b66794d3a1b568035ff3c2","name":"abs_administrator45_","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f7cbec178a59b3ec0e9b0732417e32803d988a369cc745ef68a7143376120ab?s=96&d=mm&r=g","caption":"abs_administrator45_"},"logo":{"@id":"https:\/\/www.aliburaksan.com\/blog\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/www.aliburaksan.com\/blog"],"url":"https:\/\/www.aliburaksan.com\/blog\/author\/abs_administrator45_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/comments?post=171"}],"version-history":[{"count":1,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/171\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/posts\/171\/revisions\/188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/media\/187"}],"wp:attachment":[{"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/media?parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/categories?post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aliburaksan.com\/blog\/wp-json\/wp\/v2\/tags?post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}