
{"id":563,"date":"2020-12-30T02:38:10","date_gmt":"2020-12-30T01:38:10","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=563"},"modified":"2022-09-25T21:58:24","modified_gmt":"2022-09-25T19:58:24","slug":"quest-ce-quune-cyberattaque","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/","title":{"rendered":"Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.futura-sciences.com\/buildsv6\/images\/wide1920\/f\/c\/7\/fc71a416c4_50167709_cyberattaque-oleksiin-adobe-stock.jpg\" alt=\"D\u00e9finition | Cyberattaque - Attaque informatique | Futura Tech\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Avec le d\u00e9veloppement d&rsquo;Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?&nbsp;&nbsp;Quelles sont les m\u00e9thodes des hackers et&nbsp;quelles sont les cyberattaques les plus massives ?<\/strong><\/p>\n\n\n\n<p>Une <strong>cyberattaque<\/strong> ou <strong>attaque informatique<\/strong> est une action volontaire et malveillante men\u00e9e au moyen d&rsquo;un&nbsp;<strong>r\u00e9seau informatique<\/strong>&nbsp;visant \u00e0 causer un dommage aux informations et aux personnes qui les traitent (particuliers, entreprises, h\u00f4pitaux , institutions&#8230;). <\/p>\n\n\n\n<p>Elle peut \u00eatre men\u00e9e par une personne seule (<strong>hacker<\/strong>), un groupe de <strong>pirates<\/strong>, un \u00c9tat ou une organisation criminelle.<\/p>\n\n\n\n<p style=\"font-size:24px\"><strong>Les types les plus courants de&nbsp;cyberattaques&nbsp;sont:<\/strong><\/p>\n\n\n\n<p>1- l&rsquo;installation de programmes espion ou de&nbsp;<strong>malwares<\/strong>, <\/p>\n\n\n\n<p>2- le&nbsp;<strong>phishing<\/strong>&nbsp;(hame\u00e7onnage), <\/p>\n\n\n\n<p>3- L&rsquo;attaque par&nbsp;<strong>d\u00e9ni de service<\/strong>&nbsp;(DDoS &#8211; perturbation ou&nbsp;<strong>inondation<\/strong>&nbsp;du r\u00e9seau afin de le rendre indisponible), <\/p>\n\n\n\n<p>4- le vol d&rsquo;information ou d&rsquo;identit\u00e9, <\/p>\n\n\n\n<p>5- le&nbsp;<strong>ransomware<\/strong>&nbsp;(demande de ran\u00e7on en \u00e9change d&rsquo;une cl\u00e9 de&nbsp;<strong>chiffrement<\/strong>&nbsp;des donn\u00e9es crypt\u00e9es) <\/p>\n\n\n\n<p>6- L&rsquo;attaque par brute force (trouver un&nbsp;<strong>mot de passe<\/strong>&nbsp;en testant successivement toutes les combinaisons possibles).<\/p>\n\n\n\n<p>7- Le renvoi vers un faux site<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>De nombreuses cyberattaques ont \u00e9maill\u00e9 ces derni\u00e8res ann\u00e9es, comme le&nbsp;botnet&nbsp;Mirai, les ransomwares&nbsp;WannaCry&nbsp;et NotPetya, le piratage de Sony Pictures ou l&rsquo;attaque d&rsquo;infrastructures&nbsp;nucl\u00e9aires iraniennes par le&nbsp;virus&nbsp;Stuxnet.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Les cyberattaques c\u00e9l\u00e8bres<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>1999 :&nbsp;<strong>Melissa<\/strong>. Ce<strong>&nbsp;virus<\/strong>&nbsp;infectant des pi\u00e8ces jointes Microsoft et se diss\u00e9minant via le carnet d&rsquo;adresses aurait caus\u00e9 385 millions de dollars de dommages. Il est le fait d&rsquo;un hacker nomm\u00e9 David Smith qui a \u00e9cop\u00e9 de 20 mois de prison.<\/li><li>2010 :&nbsp;<strong>Stuxnet<\/strong>. Ce virus touchant les syst\u00e8mes Windows a neutralis\u00e9 les centrifugeuses du site d&rsquo;enrichissement d&rsquo;<strong>uranium<\/strong>&nbsp;de Natanz en Iran. Stuxnet a \u00e9t\u00e9 le premier&nbsp;<strong>malware<\/strong>&nbsp;\u00e0 utiliser l&rsquo;arme informatique contre un \u00c9tat. Les services secrets isra\u00e9liens seraient derri\u00e8re cette cyberattaque.<\/li><li>2013 :&nbsp;<strong>Yahoo<\/strong>. Victime d&rsquo;un gigantesque piratage en ao\u00fbt 2013, Yahoo voit ses&nbsp;<strong>3 milliards de comptes affect\u00e9s<\/strong>, soit le plus important vol de donn\u00e9es de l&rsquo;histoire. Bien qu&rsquo;aucun mot de passe ni donn\u00e9es bancaires n&rsquo;aient \u00e9t\u00e9 d\u00e9rob\u00e9s, Yahoo a \u00e9t\u00e9 vivement critiqu\u00e9 pour avoir r\u00e9v\u00e9l\u00e9 le piratage seulement trois ans apr\u00e8s.<\/li><li>2012 :&nbsp;<strong>Shamoon<\/strong>. Ce logiciel malveillant a paralys\u00e9 la soci\u00e9t\u00e9 p\u00e9troli\u00e8re Saudi Aramco pendant 15&nbsp;jours en ao\u00fbt 2012. Le virus a \u00e0 nouveau cibl\u00e9 plusieurs soci\u00e9t\u00e9s p\u00e9troli\u00e8res et agences gouvernementales saoudiennes en 2017. L&rsquo;Iran est suspect\u00e9.<\/li><li>2014 :&nbsp;<strong>Sony Pictures<\/strong>. Les pirates, sous le nom de Guardian of Peace, ont menac\u00e9 la compagnie de d\u00e9voiler des informations sensibles si l&rsquo;entreprise n&rsquo;acc\u00e9dait pas \u00e0 leurs&nbsp;<strong>requ\u00eates<\/strong>. Cinq films ont ensuite \u00e9t\u00e9 divulgu\u00e9s sur&nbsp;<strong>Internet<\/strong>. L&rsquo;attaque a \u00e9t\u00e9 attribu\u00e9e \u00e0 la Cor\u00e9e du Nord, qui aurait voulu se venger d&rsquo;un film caricaturant le dictateur Kim Jong-un.<\/li><li>2016 :&nbsp;<strong>Mirai.<\/strong>&nbsp;Cette attaque transforme des&nbsp;ordinateurs&nbsp;Linux en bots contr\u00f4l\u00e9s \u00e0 distance, formant alors un immense botnet utilis\u00e9 notamment pour r\u00e9aliser des attaques par d\u00e9ni de service (DDoS). L&rsquo;attaque a notamment vis\u00e9 la soci\u00e9t\u00e9 Dyn, paralysant de nombreux sites et services (Twitter, PayPal, AirBnB ou&nbsp;Netflix).<\/li><li>2017 :&nbsp;<strong>WannaCry<\/strong>. Ce logiciel malveillant de type&nbsp;<strong>ransomware<\/strong>&nbsp;a touch\u00e9 plus de 300.000 ordinateurs dans 150 pays en 2017. Il&nbsp;exploite une faille de s\u00e9curit\u00e9 Windows&nbsp;\u00e0 travers des pi\u00e8ces jointes contamin\u00e9es. Il serait le fait d&rsquo;un groupe de hackers nord-cor\u00e9ens ou chinois.<\/li><li>2017 :&nbsp;<strong>NotPetya<\/strong>. Ce programme de type ransomware \u00e0 l&rsquo;origine d&rsquo;une&nbsp;cyberattaque mondiale&nbsp;vise la m\u00eame faille que&nbsp;WannaCry. Il a paralys\u00e9 plusieurs grandes entreprises comme Saint-Gobain ou Auchan ainsi que la SNCF ou le m\u00e9tro de Kiev. NotPetya serait l&rsquo;attaque informatique la plus couteuse de tous les temps (10 milliards de dollars).<\/li><\/ul>\n\n\n\n<p>Avec Futura<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avec le d\u00e9veloppement d&rsquo;Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?&nbsp;&nbsp;Quelles sont les m\u00e9thodes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,117,11],"tags":[],"class_list":["post-563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-ckoi","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu&#039;est-ce qu&#039;une cyberattaque ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce qu&#039;une cyberattaque ?\" \/>\n<meta property=\"og:description\" content=\"Avec le d\u00e9veloppement d&#039;Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?\u00a0\u00a0Quelles sont les m\u00e9thodes des hackers et\u00a0quelles sont les cyberattaques les plus massives ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-30T01:38:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-25T19:58:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/02\/social-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Qu&#039;est-ce qu&#039;une cyberattaque ?\" \/>\n<meta name=\"twitter:description\" content=\"Avec le d\u00e9veloppement d&#039;Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?\u00a0\u00a0Quelles sont les m\u00e9thodes des hackers et\u00a0quelles sont les cyberattaques les plus massives ?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/02\/social-2.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?\",\"datePublished\":\"2020-12-30T01:38:10+00:00\",\"dateModified\":\"2022-09-25T19:58:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/\"},\"wordCount\":701,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-116.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Ckoi\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/\",\"name\":\"Qu'est-ce qu'une cyberattaque ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-116.jpg\",\"datePublished\":\"2020-12-30T01:38:10+00:00\",\"dateModified\":\"2022-09-25T19:58:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-116.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/pt-116.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2020\\\/12\\\/30\\\/quest-ce-quune-cyberattaque\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu'est-ce qu'une cyberattaque ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/","og_locale":"fr_FR","og_type":"article","og_title":"Qu'est-ce qu'une cyberattaque ?","og_description":"Avec le d\u00e9veloppement d'Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?\u00a0\u00a0Quelles sont les m\u00e9thodes des hackers et\u00a0quelles sont les cyberattaques les plus massives ?","og_url":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/","og_site_name":"Parlons Techs - Store","article_published_time":"2020-12-30T01:38:10+00:00","article_modified_time":"2022-09-25T19:58:24+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/02\/social-2.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Qu'est-ce qu'une cyberattaque ?","twitter_description":"Avec le d\u00e9veloppement d'Internet et du cloud, les cyberattaques sont de plus en plus fr\u00e9quentes et perfectionn\u00e9es. Qui est derri\u00e8re ces attaques et dans quel but ?\u00a0\u00a0Quelles sont les m\u00e9thodes des hackers et\u00a0quelles sont les cyberattaques les plus massives ?","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2022\/02\/social-2.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?","datePublished":"2020-12-30T01:38:10+00:00","dateModified":"2022-09-25T19:58:24+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/"},"wordCount":701,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-116.jpg","articleSection":["Actualit\u00e9","Ckoi","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/","url":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/","name":"Qu'est-ce qu'une cyberattaque ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-116.jpg","datePublished":"2020-12-30T01:38:10+00:00","dateModified":"2022-09-25T19:58:24+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-116.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2020\/12\/pt-116.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2020\/12\/30\/quest-ce-quune-cyberattaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Qu&rsquo;est-ce qu&rsquo;une cyberattaque ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=563"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/563\/revisions"}],"predecessor-version":[{"id":3584,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/563\/revisions\/3584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/564"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}