{"id":15885,"date":"2024-08-26T17:25:11","date_gmt":"2024-08-26T14:25:11","guid":{"rendered":"https:\/\/masterbase.com\/es\/es\/es\/?p=15885"},"modified":"2024-09-13T13:35:56","modified_gmt":"2024-09-13T10:35:56","slug":"sosyal-muhendi%cc%87sli%cc%87gi%cc%87n-maskesi%cc%87ni%cc%87-dusurmek-gercek-vakalar-ve-savunma-strateji%cc%87leri%cc%87","status":"publish","type":"post","link":"https:\/\/masterbase.com\/tr\/desenmascaramos-la-ingenieria-social-casos-reales-y-estrategias-de-defensa\/masterbase\/","title":{"rendered":"Sosyal m\u00fchendisli\u011fin maskesini d\u00fc\u015f\u00fcrmek: Ger\u00e7ek vakalar ve savunma stratejileri"},"content":{"rendered":"<h1>Bir\u00e7ok ki\u015fi vir\u00fcsler, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve bilgisayar korsanlar\u0131 hakk\u0131nda endi\u015felenirken, en b\u00fcy\u00fck g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n kendimizde, yani insanlarda oldu\u011fu genellikle unutulur.<\/h1>\n<p>Sosyal m\u00fchendislik, gizli bilgileri if\u015fa etmeniz veya \u015firketinizin g\u00fcvenli\u011fini tehlikeye atacak eylemlerde bulunman\u0131z i\u00e7in sizi kand\u0131rmaya y\u00f6nelik psikolojik manip\u00fclasyona dayan\u0131r.<\/p>\n<h2><strong>Sosyal m\u00fchendislik nedir ve nas\u0131l fark edilir?<\/strong><\/h2>\n<p>Sosyal m\u00fchendislik yeni de\u011fildir, ancak teknoloji ile birlikte geli\u015fmi\u015ftir.<\/p>\n<p>Kodlar\u0131 k\u0131rmaya veya sistemleri hacklemeye ihtiya\u00e7 duymayan bir hacker d\u00fc\u015f\u00fcn\u00fcn. Bunun yerine, hassas bilgilere eri\u015fmek i\u00e7in bir \u015firketin \u00e7al\u0131\u015fanlar\u0131n\u0131 manip\u00fcle ediyor.<\/p>\n<p>Bu yakla\u015f\u0131m g\u00fcveni, merak\u0131 ve hatta korkuyu istismar eder.<\/p>\n<p>Birisi sizden hassas bilgiler istedi\u011finde veya sizi sahte bahanelerle \u015f\u00fcpheli bir ba\u011flant\u0131ya t\u0131klamaya davet etti\u011finde bir sosyal m\u00fchendislik giri\u015fimini tan\u0131yabilirsiniz.<\/p>\n<p>Kimlik av\u0131 e-postalar\u0131, doland\u0131r\u0131c\u0131l\u0131k ama\u00e7l\u0131 telefon aramalar\u0131 ve sosyal medya payla\u015f\u0131mlar\u0131 yayg\u0131n y\u00f6ntemlerdir.<\/p>\n<p>Kendinizi ve \u015firketinizi korumak i\u00e7in her zaman tetikte olmak, bilgi taleplerini her zaman do\u011frulamak ve talep edenin ger\u00e7ekli\u011finden tamamen emin olmadan asla hassas verileri payla\u015fmamak \u00e7ok \u00f6nemlidir.<\/p>\n<h2><strong>\u015eirketlerde g\u00fcvenlik a\u00e7\u0131\u011f\u0131 vakalar\u0131<\/strong><\/h2>\n<ol>\n<li><strong>\u00c7al\u0131\u015fanlar\u0131 hedef alan kimlik av\u0131<\/strong>: B\u00fcy\u00fck bir \u015firket, bir bilgisayar korsan\u0131n\u0131n BT direkt\u00f6r\u00fc k\u0131l\u0131\u011f\u0131nda birka\u00e7 \u00e7al\u0131\u015fana e-posta g\u00f6ndermesiyle sald\u0131r\u0131ya u\u011frad\u0131. E-postada \u00e7al\u0131\u015fanlardan sahte bir sitedeki \u015fifrelerini de\u011fi\u015ftirmeleri istenmi\u015f, bu da bilgisayar korsan\u0131n\u0131n \u015firket hesaplar\u0131na eri\u015fmesine olanak sa\u011flam\u0131\u015ft\u0131r.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>Kimlik av\u0131 sald\u0131r\u0131s\u0131<\/strong>Ba\u015fka bir \u015firkette, bir bilgisayar korsan\u0131 \u015firketin d\u00fczenli tedarik\u00e7isi gibi davranm\u0131\u015f ve \u00f6demeler i\u00e7in banka hesab\u0131n\u0131n de\u011fi\u015ftirilmesini talep etmi\u015ftir. \u015eirket doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n fark\u0131na varmadan \u00f6nce hacker'\u0131n hesab\u0131na b\u00fcy\u00fck miktarda para aktarm\u0131\u015ft\u0131r.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li><strong>Sosyal a\u011flar arac\u0131l\u0131\u011f\u0131yla sosyal m\u00fchendislik<\/strong>: Bir \u00e7al\u0131\u015fan yapt\u0131\u011f\u0131 i\u015fin ve kulland\u0131\u011f\u0131 sistemlerin detaylar\u0131n\u0131 sosyal medyada payla\u015ft\u0131. Bir hacker bu bilgileri \u015firketin teknik destek departman\u0131n\u0131 kand\u0131rmak ve \u00e7al\u0131\u015fan\u0131n hesaplar\u0131na eri\u015fim sa\u011flamak i\u00e7in kulland\u0131.<\/li>\n<\/ol>\n<h2><strong>Sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131n\u0131 \u00f6nleyen \u015firketlerin ba\u015far\u0131 hikayeleri<\/strong><\/h2>\n<h3><strong>1. Kimlik av\u0131 giri\u015fimi personel fark\u0131ndal\u0131\u011f\u0131 ile durduruldu<\/strong><\/h3>\n<p><strong>Hackerlar\u0131n denedi\u011fi \u015fey:<\/strong> Bir grup siber su\u00e7lu, birka\u00e7 \u00e7al\u0131\u015fana kimlik av\u0131 e-postalar\u0131 g\u00f6ndererek bir finansal hizmetler \u015firketine sald\u0131rmaya \u00e7al\u0131\u015ft\u0131. E-postalar \u015firketin finans m\u00fcd\u00fcr\u00fcnden gelmi\u015f gibi g\u00f6r\u00fcn\u00fcyor ve \u00e7al\u0131\u015fanlardan kimlik bilgilerini \u015firketin giri\u015f sayfas\u0131n\u0131 taklit eden bir web sitesine girmelerini istiyordu. Ama\u00e7, \u00e7al\u0131\u015fan hesaplar\u0131na eri\u015fim sa\u011flamak ve dahili sistemleri tehlikeye atmakt\u0131.<\/p>\n<p><strong>Bunu nas\u0131l \u00f6nlediler:<\/strong> Devam eden siber g\u00fcvenlik e\u011fitim program\u0131 sayesinde \u00e7al\u0131\u015fanlardan biri e-postan\u0131n \u015f\u00fcpheli oldu\u011funu fark etti. Ba\u011flant\u0131ya t\u0131klamak yerine \u015firketin g\u00fcvenlik ekibini bilgilendirdi. Bu ekip e-postay\u0131 analiz edebildi ve bunun bir kimlik av\u0131 giri\u015fimi oldu\u011funu do\u011frulad\u0131. Ard\u0131ndan t\u00fcm kurulu\u015fu uyard\u0131lar ve g\u00fcvenlik \u00f6nlemlerini g\u00fc\u00e7lendirerek sald\u0131r\u0131n\u0131n ba\u015far\u0131l\u0131 olmas\u0131n\u0131 engellediler.<\/p>\n<h3><strong>2. Titiz do\u011frulama ile kimli\u011fe b\u00fcr\u00fcnme engellenir<\/strong><\/h3>\n<p><strong>Hackerlar\u0131n denedi\u011fi \u015fey:<\/strong> Bir ba\u015fka \u00f6rnekte, bir bilgisayar korsan\u0131 bir imalat \u015firketinin d\u00fczenli tedarik\u00e7isi gibi davranm\u0131\u015f ve \u00f6demelerin yap\u0131ld\u0131\u011f\u0131 banka hesab\u0131nda de\u011fi\u015fiklik talep eden bir e-postay\u0131 bor\u00e7lu hesaplar departman\u0131na g\u00f6ndermi\u015ftir. Bilgisayar korsan\u0131n\u0131n plan\u0131, b\u00fcy\u00fck miktarda paray\u0131 kendi kontrollerindeki bir hesaba aktarmakt\u0131.<\/p>\n<p><strong>Bunu nas\u0131l \u00f6nlediler:<\/strong> \u015eirket politikas\u0131, \u00f6deme bilgilerindeki herhangi bir de\u011fi\u015fiklik talebinin tedarik\u00e7iyle do\u011frudan telefon g\u00f6r\u00fc\u015fmesi yap\u0131larak do\u011frulanmas\u0131n\u0131 gerektiriyordu. Talebi do\u011frulamaya \u00e7al\u0131\u015fan bor\u00e7 hesaplar\u0131 departman\u0131, de\u011fi\u015fiklik talebinde bulundu\u011funu reddeden ger\u00e7ek tedarik\u00e7iyle ileti\u015fime ge\u00e7ti. Bu durum k\u0131rm\u0131z\u0131 bir bayrak olu\u015fturdu ve kimli\u011fe b\u00fcr\u00fcnme giri\u015fimi herhangi bir para transferi yap\u0131lmadan \u00f6nce engellendi.<\/p>\n<h3><strong>3. Proaktif izleme ile bozulan sosyal a\u011flar arac\u0131l\u0131\u011f\u0131yla sosyal m\u00fchendislik<\/strong><\/h3>\n<p><strong>Hackerlar\u0131n denedi\u011fi \u015fey:<\/strong> Bir s\u0131zma giri\u015fiminde, bilgisayar korsanlar\u0131 bir teknoloji \u015firketinin bir \u00e7al\u0131\u015fan\u0131n\u0131 sosyal a\u011flar\u0131 arac\u0131l\u0131\u011f\u0131yla tespit etti. Daha sonra sahte bir profil olu\u015fturmak ve onun kimli\u011fine b\u00fcr\u00fcnmek i\u00e7in \u00e7al\u0131\u015fan\u0131n payla\u015ft\u0131\u011f\u0131 bilgileri kulland\u0131lar. Plan, \u015firketin teknik deste\u011fiyle ileti\u015fime ge\u00e7mek ve eri\u015fim sorunlar\u0131 oldu\u011funu iddia ederek \u015fifre s\u0131f\u0131rlama talebinde bulunmakt\u0131.<\/p>\n<p><strong>Bunu nas\u0131l \u00f6nlediler:<\/strong> \u015eirket, sosyal m\u00fchendislikle ilgili potansiyel g\u00fcvenlik risklerini tespit etmek \u00fczere tasarlanm\u0131\u015f proaktif bir sosyal medya izleme sistemine sahipti. Sahte profilin olu\u015fturuldu\u011funu fark eden g\u00fcvenlik ekibi, \u00e7al\u0131\u015fan\u0131n hesaplar\u0131n\u0131 korumak i\u00e7in derhal harekete ge\u00e7ti ve teknik destek personelini aldatmaca giri\u015fiminden haberdar etti. Sonu\u00e7 olarak, bilgisayar korsan\u0131 hi\u00e7bir hesaba eri\u015fim sa\u011flayamad\u0131 ve \u015firketin g\u00fcvenli\u011fi sa\u011flam kald\u0131.<\/p>\n<p>Bu vakalar haz\u0131rl\u0131k, e\u011fitim ve net politikalar\u0131n ba\u015far\u0131l\u0131 bir sosyal m\u00fchendislik sald\u0131r\u0131s\u0131n\u0131 \u00f6nlemede nas\u0131l fark yaratabilece\u011fini g\u00f6stermektedir. \u00d6nemli olan tetikte olmak ve her zaman sa\u011flam bir g\u00fcvenlik protokol\u00fcne sahip olmakt\u0131r.<\/p>\n<h3><strong>\u00d6zet<\/strong><\/h3>\n<p>Sosyal m\u00fchendislik karma\u015f\u0131k bir zorluktur \u00e7\u00fcnk\u00fc teknolojiye de\u011fil insan manip\u00fclasyonuna dayan\u0131r. \u015eirketler \u00e7al\u0131\u015fanlar\u0131n\u0131 potansiyel bir sald\u0131r\u0131n\u0131n i\u015faretlerini tan\u0131malar\u0131 i\u00e7in e\u011fitmeli ve bilgi taleplerini ele almak i\u00e7in net prosed\u00fcrler olu\u015fturmal\u0131d\u0131r. Fark\u0131ndal\u0131k, e\u011fitim ve g\u00fcvenlik protokollerinin bir kombinasyonu bu tehditlere kar\u015f\u0131 korunman\u0131n anahtar\u0131 olabilir.<\/p>\n<p><a href=\"https:\/\/masterbase.com\/tr\/es\/es\/es\/akademi%cc%87\/mevcut-kurslar\/otomasyon-serti%cc%87fi%cc%87ka-kursunu-kesfedi%cc%87n\/\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"9097\" data-permalink=\"https:\/\/masterbase.com\/tr\/hacia-un-futuro-saludable-la-impactante-evolucion-de-los-procesos-hospitalarios-mediante-la-automatizacion\/masterbase\/image-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?fit=980%2C451&amp;ssl=1\" data-orig-size=\"980,451\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Curso Automatizaci\u00f3n\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?fit=800%2C368&amp;ssl=1\" class=\"aligncenter wp-image-9097\" src=\"https:\/\/i0.wp.com\/masterbase.com\/es\/es\/es\/wp-content\/uploads\/2024\/01\/image-1-300x138.png?resize=517%2C238&#038;ssl=1\" alt=\"Otomasyon kursu\" width=\"517\" height=\"238\" srcset=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=300%2C138&amp;ssl=1 300w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=768%2C353&amp;ssl=1 768w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?resize=18%2C8&amp;ssl=1 18w, https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/01\/image-1.png?w=980&amp;ssl=1 980w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Sosyal m\u00fchendislik, siber g\u00fcvenlikte en hafife al\u0131nan tehditlerden biridir.<\/p>","protected":false},"author":239642484,"featured_media":16003,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1391],"tags":[],"class_list":["post-15885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae<\/title>\n<meta name=\"description\" content=\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/masterbase.com\/tr\/sosyal-muhendi\u0307sli\u0307gi\u0307n-maskesi\u0307ni\u0307-dusurmek-gercek-vakalar-ve-savunma-strateji\u0307leri\u0307\/masterbase\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae\" \/>\n<meta property=\"og:description\" content=\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/masterbase.com\/tr\/sosyal-muhendi\u0307sli\u0307gi\u0307n-maskesi\u0307ni\u0307-dusurmek-gercek-vakalar-ve-savunma-strateji\u0307leri\u0307\/masterbase\/\" \/>\n<meta property=\"og:site_name\" content=\"MasterBase\u00ae\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-26T14:25:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T10:35:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alejandro Dur\u00e1n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Dur\u00e1n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/\"},\"author\":{\"name\":\"Alejandro Dur\u00e1n\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#\\\/schema\\\/person\\\/3d21ff79b63b95ca967e019b4c633701\"},\"headline\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa\",\"datePublished\":\"2024-08-26T14:25:11+00:00\",\"dateModified\":\"2024-09-13T10:35:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/\"},\"wordCount\":978,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"articleSection\":[\"Ciberseguridad\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/\",\"url\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/\",\"name\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"datePublished\":\"2024-08-26T14:25:11+00:00\",\"dateModified\":\"2024-09-13T10:35:56+00:00\",\"description\":\"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/3-3.png?fit=2000%2C2000&ssl=1\",\"width\":2000,\"height\":2000,\"caption\":\"Ingenier\u00eda Social\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/nb\\\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\\\/masterbase\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/masterbase.com\\\/da\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/masterbase.com\\\/es\\\/\",\"name\":\"MasterBase\u00ae\",\"description\":\"Automatas that work for you\",\"publisher\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/masterbase.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#organization\",\"name\":\"MasterBase\u00ae\",\"url\":\"https:\\\/\\\/masterbase.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/masterbase.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1\",\"width\":1476,\"height\":972,\"caption\":\"MasterBase\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/masterbase.com\\\/es\\\/#\\\/schema\\\/person\\\/3d21ff79b63b95ca967e019b4c633701\",\"name\":\"Alejandro Dur\u00e1n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g\",\"caption\":\"Alejandro Dur\u00e1n\"},\"description\":\"Chief Marketing Ofiicer\",\"url\":\"https:\\\/\\\/masterbase.com\\\/tr\\\/author\\\/aledurmc1970\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sosyal m\u00fchendisli\u011fin maskesini d\u00fc\u015f\u00fcrmek: ger\u00e7ek vakalar ve savunma stratejileri - MasterBase\u00ae","description":"Bir\u00e7ok ki\u015fi vir\u00fcsler, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve bilgisayar korsanlar\u0131 hakk\u0131nda endi\u015felenirken, en b\u00fcy\u00fck g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n kendimizde, yani insanlarda oldu\u011fu genellikle unutulur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/masterbase.com\/tr\/sosyal-muhendi\u0307sli\u0307gi\u0307n-maskesi\u0307ni\u0307-dusurmek-gercek-vakalar-ve-savunma-strateji\u0307leri\u0307\/masterbase\/","og_locale":"tr_TR","og_type":"article","og_title":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa - MasterBase\u00ae","og_description":"Aunque muchos se preocupan por los virus, malware y hackers, a menudo se olvida que la mayor vulnerabilidad est\u00e1 en nosotros mismos: los humanos.","og_url":"https:\/\/masterbase.com\/tr\/sosyal-muhendi\u0307sli\u0307gi\u0307n-maskesi\u0307ni\u0307-dusurmek-gercek-vakalar-ve-savunma-strateji\u0307leri\u0307\/masterbase\/","og_site_name":"MasterBase\u00ae","article_published_time":"2024-08-26T14:25:11+00:00","article_modified_time":"2024-09-13T10:35:56+00:00","og_image":[{"width":2000,"height":2000,"url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","type":"image\/png"}],"author":"Alejandro Dur\u00e1n","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Alejandro Dur\u00e1n","Tahmini okuma s\u00fcresi":"5 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#article","isPartOf":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/"},"author":{"name":"Alejandro Dur\u00e1n","@id":"https:\/\/masterbase.com\/es\/#\/schema\/person\/3d21ff79b63b95ca967e019b4c633701"},"headline":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa","datePublished":"2024-08-26T14:25:11+00:00","dateModified":"2024-09-13T10:35:56+00:00","mainEntityOfPage":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/"},"wordCount":978,"commentCount":0,"publisher":{"@id":"https:\/\/masterbase.com\/es\/#organization"},"image":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","articleSection":["Ciberseguridad"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/","url":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/","name":"Sosyal m\u00fchendisli\u011fin maskesini d\u00fc\u015f\u00fcrmek: ger\u00e7ek vakalar ve savunma stratejileri - MasterBase\u00ae","isPartOf":{"@id":"https:\/\/masterbase.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#primaryimage"},"image":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","datePublished":"2024-08-26T14:25:11+00:00","dateModified":"2024-09-13T10:35:56+00:00","description":"Bir\u00e7ok ki\u015fi vir\u00fcsler, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve bilgisayar korsanlar\u0131 hakk\u0131nda endi\u015felenirken, en b\u00fcy\u00fck g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n kendimizde, yani insanlarda oldu\u011fu genellikle unutulur.","breadcrumb":{"@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#primaryimage","url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","contentUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","width":2000,"height":2000,"caption":"Ingenier\u00eda Social"},{"@type":"BreadcrumbList","@id":"https:\/\/masterbase.com\/nb\/avsloring-av-sosial-manipulering-reelle-tilfeller-og-forsvarsstrategier\/masterbase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/masterbase.com\/da\/"},{"@type":"ListItem","position":2,"name":"Desenmascaramos la ingenier\u00eda social: Casos reales y estrategias de defensa"}]},{"@type":"WebSite","@id":"https:\/\/masterbase.com\/es\/#website","url":"https:\/\/masterbase.com\/es\/","name":"MasterBase\u00ae","description":"Sizin i\u00e7in \u00e7al\u0131\u015fan otomatlar","publisher":{"@id":"https:\/\/masterbase.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/masterbase.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/masterbase.com\/es\/#organization","name":"MasterBase\u00ae","url":"https:\/\/masterbase.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/masterbase.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2023\/09\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1","contentUrl":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2023\/09\/Logo_negro_sinslogan.png?fit=1476%2C972&ssl=1","width":1476,"height":972,"caption":"MasterBase\u00ae"},"image":{"@id":"https:\/\/masterbase.com\/es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/masterbase.com\/es\/#\/schema\/person\/3d21ff79b63b95ca967e019b4c633701","name":"Alejandro Dur\u00e1n","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fe6c9cd72fdfdd05519326fb5760e0745d9540d0bddb8b16403235a121c8e64?s=96&d=identicon&r=g","caption":"Alejandro Dur\u00e1n"},"description":"Pazarlama \u015eefi","url":"https:\/\/masterbase.com\/tr\/author\/aledurmc1970\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/masterbase.com\/wp-content\/uploads\/2024\/08\/3-3.png?fit=2000%2C2000&ssl=1","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pf6Ilf-48d","_links":{"self":[{"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/posts\/15885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/users\/239642484"}],"replies":[{"embeddable":true,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/comments?post=15885"}],"version-history":[{"count":2,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/posts\/15885\/revisions"}],"predecessor-version":[{"id":15888,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/posts\/15885\/revisions\/15888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/media\/16003"}],"wp:attachment":[{"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/media?parent=15885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/categories?post=15885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/masterbase.com\/tr\/wp-json\/wp\/v2\/tags?post=15885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}