{"id":2935,"date":"2010-12-15T08:32:04","date_gmt":"2010-12-15T06:32:04","guid":{"rendered":"http:\/\/www.teknoloji-haber.net\/?p=2935"},"modified":"2010-12-15T08:32:04","modified_gmt":"2010-12-15T06:32:04","slug":"bu-trojan-cok-tehlikeli","status":"publish","type":"post","link":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html","title":{"rendered":"Bu trojan \u00e7ok tehlikeli"},"content":{"rendered":"

Kas\u0131m ay\u0131nda d\u00fcnyada en \u00e7ok kar\u015f\u0131la\u015f\u0131lan tehditlere yeni bir truva at\u0131(trojan) dahil oldu.<\/h1>\n

Antivir\u00fcs yaz\u0131l\u0131m kurulu\u015flar\u0131ndan ESET’in haz\u0131rlad\u0131\u011f\u0131 bilgisayarlara y\u00f6nelik tehdit raporuna g\u00f6re, kas\u0131m ay\u0131nda d\u00fcnyada en \u00e7ok kar\u015f\u0131la\u015f\u0131lan tehditlere yeni bir truva at\u0131 dahil oldu.<\/p>\n

\"bu

bu trojan \u00e7ok tehlikeli<\/p><\/div>\n

ESET’ten yap\u0131lan a\u00e7\u0131klamada, ”JS\/Exploit” olarak tan\u0131mlanan ve ba\u015fka zararl\u0131 yaz\u0131l\u0131mlar ile birlikte gelen bu truva at\u0131n\u0131n, baz\u0131 sistemlerdeki a\u00e7\u0131klar\u0131 kullanarak s\u0131zd\u0131\u011f\u0131 ve bula\u015ft\u0131\u011f\u0131 sistemde kodlar\u0131n uzaktan \u00e7al\u0131\u015ft\u0131r\u0131labilmesini sa\u011flad\u0131\u011f\u0131 belirtildi.<\/p>\n

A\u00e7\u0131klamada, istismarc\u0131 denilen bu zararl\u0131 yaz\u0131l\u0131m\u0131n, bilgisayar tehditleri listesine d\u00fcnyada 7. s\u0131radan, T\u00fcrkiye’de ise 5. s\u0131radan girdi\u011fi kaydedildi.<\/p>\n

ESET’in analizlerine g\u00f6re ”JS\/Exploit” adl\u0131 yaz\u0131l\u0131m\u0131n y\u00fczde 0,99’luk oran\u0131yla d\u00fcnya listesine ilk defa girdi\u011fi, ”JS\/Exploit”in, Microsoft Internet Explorer 6 ve 7 s\u00fcr\u00fcmlerinde yer alan teknik ifadeyle ”CVE-2010-0806” olarak bilinen a\u00e7\u0131\u011f\u0131 kullanarak sald\u0131ran bir truva at\u0131 oldu\u011fu ifade edilen a\u00e7\u0131klamada, zararl\u0131 yaz\u0131l\u0131m\u0131n, i\u015fletim sistemlerinde ve uygulamalarda unutulmu\u015f olan bu tip a\u00e7\u0131klar\u0131 de\u011ferlendirdi\u011fi, istismar etti\u011fi ve b\u00f6ylece kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131na yerle\u015fti\u011fi, yerle\u015ftikten sonra da o bilgisayarda istenilen pek \u00e7ok \u015feyi uzaktan yap\u0131labilir hale getirdi\u011fi, bu sald\u0131r\u0131n\u0131n kullan\u0131c\u0131 bilgilerinin a\u00e7\u0131\u011fa \u00e7\u0131kmas\u0131na neden olabildi\u011fi vurguland\u0131.<\/p>\n

ESET uzmanlar\u0131 da a\u00e7\u0131klamada, istismarc\u0131 vir\u00fcslere kar\u015f\u0131 sistem yamalar\u0131n\u0131n indirilmesini ve i\u015fletim sistemlerine y\u00f6nelik g\u00fcncellemelerin ihmal edilmemesini \u00f6nerirken, g\u00fcncel bir anvir\u00fcs yaz\u0131l\u0131m\u0131n\u0131n bu t\u00fcr risklere kar\u015f\u0131 uyar\u0131da bulunaca\u011f\u0131na da dikkati \u00e7ekti.<\/p>\n

Verilen bilgiye g\u00f6re, d\u00fcnyadaki tehdit listesine bak\u0131ld\u0131\u011f\u0131nda, \u00e7\u0131kar\u0131labilir USB’lerden gelen vir\u00fcsleri tan\u0131mlayan INF\/Autorun \u00f6nde gidiyor. Bu tehdidi ise Win32\/Conficker solucan\u0131 takip ediyor. T\u00fcrkiye’de ise USB’den gelen tehditlerin ard\u0131ndan kullan\u0131c\u0131 bilgilerini \u00e7almaya odaklanan ”Win32\/Agent” adl\u0131 truva at\u0131 en y\u00fcksek tehlike s\u0131ralamas\u0131nda ikinci s\u0131rada bulunuyor.<\/p>\n","protected":false},"excerpt":{"rendered":"

Kas\u0131m ay\u0131nda d\u00fcnyada en \u00e7ok kar\u015f\u0131la\u015f\u0131lan tehditlere yeni bir truva at\u0131(trojan) dahil oldu. Antivir\u00fcs yaz\u0131l\u0131m..<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1234],"tags":[61,153,20,71,16,556,36,22,105,102,4686,1827,550,4681,29,63,91,294,575,4684,140,51,14,117,4687,374,4682,4683,862,1826,290,208,4685,41],"yoast_head":"\nBu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net\" \/>\n<meta property=\"og:description\" content=\"Kas\u0131m ay\u0131nda d\u00fcnyada en \u00e7ok kar\u015f\u0131la\u015f\u0131lan tehditlere yeni bir truva at\u0131(trojan) dahil oldu. Antivir\u00fcs yaz\u0131l\u0131m..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\" \/>\n<meta property=\"og:site_name\" content=\"Teknoloji-Haber.Net\" \/>\n<meta property=\"article:author\" content=\"teknolojikhaberler\" \/>\n<meta property=\"article:published_time\" content=\"2010-12-15T06:32:04+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@teknolojiburada\" \/>\n<meta name=\"twitter:site\" content=\"@teknolojiburada\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/1636d284d41a6207515ab0264ebe8ade\"},\"headline\":\"Bu trojan \u00e7ok tehlikeli\",\"datePublished\":\"2010-12-15T06:32:04+00:00\",\"dateModified\":\"2010-12-15T06:32:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\"},\"wordCount\":369,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg\",\"keywords\":{\"0\":\"3D\",\"1\":\"3g\",\"2\":\"3G telefonlar\",\"3\":\"4G\",\"4\":\"adsl\",\"5\":\"antivir\u00fcs\",\"6\":\"apple\",\"7\":\"Bilgisayar\",\"8\":\"Bing\",\"9\":\"Call of Duty\",\"10\":\"Donan\u0131m\",\"11\":\"eset\",\"12\":\"firefox\",\"14\":\"gmail\",\"15\":\"google\",\"16\":\"Google Phone\",\"17\":\"g\u00fcvenlik\",\"18\":\"g\u00fcvenlik a\u00e7\u0131\u011f\u0131\",\"19\":\"\u0130nternet\",\"20\":\"\u0130nternet Explorer\",\"21\":\"internet h\u0131z\u0131\",\"22\":\"microsoft\",\"23\":\"nano teknoloji\",\"24\":\"Oyun\",\"25\":\"robot\",\"26\":\"Teknoloji\",\"27\":\"Telefon\",\"28\":\"trojan\",\"29\":\"truva at\u0131\",\"30\":\"vir\u00fcs\",\"31\":\"Yararl\u0131 Bilgiler\",\"32\":\"Yaz\u0131l\u0131m\",\"33\":\"youtube\"},\"articleSection\":[\"G\u00fcncel\"],\"inLanguage\":\"tr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\",\"url\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\",\"name\":\"Bu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net\",\"isPartOf\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg\",\"datePublished\":\"2010-12-15T06:32:04+00:00\",\"dateModified\":\"2010-12-15T06:32:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage\",\"url\":\"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg\",\"contentUrl\":\"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.teknoloji-haber.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bu trojan \u00e7ok tehlikeli\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#website\",\"url\":\"https:\/\/www.teknoloji-haber.net\/\",\"name\":\"Teknoloji-Haber.Net\",\"description\":\"Teknoloji Haber Net\",\"publisher\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.teknoloji-haber.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#organization\",\"name\":\"Teknoloji-Haber.Net\",\"url\":\"https:\/\/www.teknoloji-haber.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2014\/01\/logo31-e1429195999492.png\",\"contentUrl\":\"https:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2014\/01\/logo31-e1429195999492.png\",\"width\":240,\"height\":58,\"caption\":\"Teknoloji-Haber.Net\"},\"image\":{\"@id\":\"https:\/\/www.teknoloji-haber.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/teknolojiburada\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/1636d284d41a6207515ab0264ebe8ade\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/26980fd0d3fdad2ce9055e0c203e9565?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/26980fd0d3fdad2ce9055e0c203e9565?s=96&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/www.teknoloji-haber.net\",\"teknolojikhaberler\",\"https:\/\/twitter.com\/teknolojiburada\"],\"url\":\"https:\/\/www.teknoloji-haber.net\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html","og_locale":"tr_TR","og_type":"article","og_title":"Bu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net","og_description":"Kas\u0131m ay\u0131nda d\u00fcnyada en \u00e7ok kar\u015f\u0131la\u015f\u0131lan tehditlere yeni bir truva at\u0131(trojan) dahil oldu. Antivir\u00fcs yaz\u0131l\u0131m..","og_url":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html","og_site_name":"Teknoloji-Haber.Net","article_author":"teknolojikhaberler","article_published_time":"2010-12-15T06:32:04+00:00","og_image":[{"url":"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@teknolojiburada","twitter_site":"@teknolojiburada","twitter_misc":{"Yazan:":"admin","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#article","isPartOf":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html"},"author":{"name":"admin","@id":"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/1636d284d41a6207515ab0264ebe8ade"},"headline":"Bu trojan \u00e7ok tehlikeli","datePublished":"2010-12-15T06:32:04+00:00","dateModified":"2010-12-15T06:32:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html"},"wordCount":369,"commentCount":0,"publisher":{"@id":"https:\/\/www.teknoloji-haber.net\/#organization"},"image":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage"},"thumbnailUrl":"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg","keywords":{"0":"3D","1":"3g","2":"3G telefonlar","3":"4G","4":"adsl","5":"antivir\u00fcs","6":"apple","7":"Bilgisayar","8":"Bing","9":"Call of Duty","10":"Donan\u0131m","11":"eset","12":"firefox","14":"gmail","15":"google","16":"Google Phone","17":"g\u00fcvenlik","18":"g\u00fcvenlik a\u00e7\u0131\u011f\u0131","19":"\u0130nternet","20":"\u0130nternet Explorer","21":"internet h\u0131z\u0131","22":"microsoft","23":"nano teknoloji","24":"Oyun","25":"robot","26":"Teknoloji","27":"Telefon","28":"trojan","29":"truva at\u0131","30":"vir\u00fcs","31":"Yararl\u0131 Bilgiler","32":"Yaz\u0131l\u0131m","33":"youtube"},"articleSection":["G\u00fcncel"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html","url":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html","name":"Bu trojan \u00e7ok tehlikeli - Teknoloji-Haber.Net","isPartOf":{"@id":"https:\/\/www.teknoloji-haber.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage"},"image":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage"},"thumbnailUrl":"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg","datePublished":"2010-12-15T06:32:04+00:00","dateModified":"2010-12-15T06:32:04+00:00","breadcrumb":{"@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#primaryimage","url":"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg","contentUrl":"http:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2010\/12\/trojan-virus-200x149.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.teknoloji-haber.net\/guncel\/bu-trojan-cok-tehlikeli.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.teknoloji-haber.net\/"},{"@type":"ListItem","position":2,"name":"Bu trojan \u00e7ok tehlikeli"}]},{"@type":"WebSite","@id":"https:\/\/www.teknoloji-haber.net\/#website","url":"https:\/\/www.teknoloji-haber.net\/","name":"Teknoloji-Haber.Net","description":"Teknoloji Haber Net","publisher":{"@id":"https:\/\/www.teknoloji-haber.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.teknoloji-haber.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.teknoloji-haber.net\/#organization","name":"Teknoloji-Haber.Net","url":"https:\/\/www.teknoloji-haber.net\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.teknoloji-haber.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2014\/01\/logo31-e1429195999492.png","contentUrl":"https:\/\/www.teknoloji-haber.net\/wp-content\/uploads\/2014\/01\/logo31-e1429195999492.png","width":240,"height":58,"caption":"Teknoloji-Haber.Net"},"image":{"@id":"https:\/\/www.teknoloji-haber.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/teknolojiburada"]},{"@type":"Person","@id":"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/1636d284d41a6207515ab0264ebe8ade","name":"admin","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.teknoloji-haber.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/26980fd0d3fdad2ce9055e0c203e9565?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/26980fd0d3fdad2ce9055e0c203e9565?s=96&r=g","caption":"admin"},"sameAs":["http:\/\/www.teknoloji-haber.net","teknolojikhaberler","https:\/\/twitter.com\/teknolojiburada"],"url":"https:\/\/www.teknoloji-haber.net\/author\/admin"}]}},"_links":{"self":[{"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/posts\/2935"}],"collection":[{"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/comments?post=2935"}],"version-history":[{"count":0,"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/posts\/2935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/media?parent=2935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/categories?post=2935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.teknoloji-haber.net\/wp-json\/wp\/v2\/tags?post=2935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}