
{"version":"1.0","provider_name":"Parlons Techs - Store","provider_url":"https:\/\/parlonstechs.com\/all","author_name":"wisdom","author_url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/","title":"Qu'est-ce qu'une cyberattaque ?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vMAoFozyfh\"><a href=\"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/\">Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/embed\/#?secret=vMAoFozyfh\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?\u00a0\u00bb &#8212; Parlons Techs - Store\" data-secret=\"vMAoFozyfh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/parlonstechs.com\/all\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/02\/social-2.jpg","thumbnail_width":900,"thumbnail_height":500,"description":"Avec le d\u00e9veloppement d'Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?\u00a0\u00a0Quelles sont les m\u00e9thodes des hackers et\u00a0quelles sont les cyberattaques les plus massives ?"}