
{"id":6308,"date":"2024-04-16T13:22:02","date_gmt":"2024-04-16T11:22:02","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=6308"},"modified":"2024-04-16T13:29:36","modified_gmt":"2024-04-16T11:29:36","slug":"gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/","title":{"rendered":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/pic.clubic.com\/v1\/images\/2203872\/raw?fit=max&amp;width=1200&amp;hash=651a28af8c49034b586d0b5e9a0da573fc7d0b79\" alt=\"Des malwares voleurs de cookies peuvent contourner la double authentification \u00a9 Sergei Elagin \/ Shutterstock\" \/><\/p>\n<h2><strong>Aucun syst\u00e8me informatique n\u2019est inviolable, m\u00eame ceux que l\u2019on pensait les plus s\u00e9curis\u00e9s. Voil\u00e0 ce que nous apprend la d\u00e9couverte d\u2019une nouvelle campagne de piratage visant les comptes Gmail.<\/strong><\/h2>\n<p>La double authentification\u00a0n\u2019est malheureusement pas infaillible. Mesure de s\u00e9curit\u00e9\u00a0devenue populaire ces derni\u00e8res ann\u00e9es sur Gmail\u00a0(et qui consiste \u00e0 ajouter une seconde validation, en plus du mot de passe, au moment de se connecter \u00e0 son compte Google), cette derni\u00e8re n\u2019emp\u00eache pas les pirates les plus d\u00e9termin\u00e9es de subtiliser l\u2019acc\u00e8s \u00e0 certains comptes.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Une attaque via malware<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Comme le raconte le magazine Forbes, de plus en plus de t\u00e9moignages sur Reddit et sur les forums de Google font \u00e9tat de personnes ayant perdu l\u2019acc\u00e8s \u00e0 leur compte Google malgr\u00e9 l\u2019activation de l\u2019authentification \u00e0 deux facteurs, justement cens\u00e9s limiter les risques de piratage.\u00a0Un internaute explique en effet que son compte Google a \u00e9t\u00e9 pirat\u00e9\u00a0et que \u00ab\u2009<em>le pirate a chang\u00e9 le mot de passe et les param\u00e8tres authentification multifacteur<\/em>\u2009\u00bb ne permettant donc plus de r\u00e9cup\u00e9rer l\u2019acc\u00e8s \u00e0 son compte. Pour ne rien arranger, l\u2019auteur du post explique que son compte YouTube a en plus \u00e9t\u00e9 d\u00e9tourn\u00e9 pour faire la promotion de malware.<\/p>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Mais comment les pirates parviennent-ils \u00e0 gagner l\u2019acc\u00e8s \u00e0 ces comptes alors que l\u2019authentification \u00e0 deux facteurs et pr\u00e9cis\u00e9ment cens\u00e9e emp\u00eacher cela\u2009? H\u00e9 bien \u00e0 l\u2019aide d\u2019un malware tout particulier, capable de\u00a0voler les cookies des utilisateurs et utilisatrices. Pas de panique, on vous explique.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<h2 class=\"marty-title\">Vol de cookies et vol de Gmail<\/h2>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">Lorsque vous vous connectez \u00e0 votre compte Google prot\u00e9g\u00e9 par la double authentification, avant de valider votre connexion, une petite case vous propose de \u00ab\u2009<em>ne plus me demander sur cet appareil<\/em>\u2009\u00bb. Si elle est coch\u00e9e, la prochaine tentative de connexion sur l\u2019appareil n\u2019exigera pas de 2e\u00a0facteur d\u2019authentification. \u00c0 la place, un cookie, dit \u00ab\u2009de session\u2009\u00bb, stock\u00e9e sur la m\u00e9moire de votre t\u00e9l\u00e9phone\/ordinateur, indiquera au site que cet utilisateur ou utilisatrice a d\u00e9j\u00e0 prouv\u00e9 son identit\u00e9 auparavant.<\/p>\n<\/div>\n<\/div>\n<div class=\"marty-row\">\n<div class=\"marty-cell marty-size-12\">\n<p class=\"marty-paragraph-left\">C\u2019est pr\u00e9cis\u00e9ment ce cookie de quelques kilooctets que les pirates vont aller chercher \u00e0 l\u2019aide de campagne d\u2019hame\u00e7onnage destin\u00e9 \u00e0 propager des malwares. Ces derniers vont ensuite transmettre les fichiers \u00e0 des tiers qui pourront donc s\u2019identifier \u00e0 l\u2019aide d\u2019un cookie vol\u00e9 sans que Google ne trouve rien \u00e0 redire l\u00e0-dessus.\u00a0Ces techniques ne sont pas exactement nouvelles, mais une vague d&rsquo;arnaque semblent rena\u00eetre r\u00e9cemment.<\/p>\n<p>Les malwares voleurs de cookies semblent actuellement se propager via des campagnes d\u2019arnaques aux cryptomonnaies et via des vid\u00e9os YouTube promettant d\u2019acc\u00e9der facilement \u00e0 des jeux pirat\u00e9s. De son c\u00f4t\u00e9, Google indique \u00ab\u2009<em>mettre \u00e0 jour en permanence ses techniques pour d\u00e9tecter et bloquer les acc\u00e8s suspects \u00e0 l\u2019aide de cookies vol\u00e9s<\/em>\u2009\u00bb, notamment avec une nouvelle fonctionnalit\u00e9 de Chrome\u00a0sp\u00e9cialement pens\u00e9 pour contrer le vol de cookies.<\/p>\n<p>En attendant que des nouvelles mesures de s\u00e9curit\u00e9 soit impl\u00e9ment\u00e9es dans\u00a0les diff\u00e9rents navigateurs webs que vous utilisez, faites toujours tr\u00e8s attention aux sites que vous visitez et aux logiciels que vous t\u00e9l\u00e9chargez.<\/p>\n<p>&nbsp;<\/p>\n<p><em><small>Sources :\u00a0<\/small><\/em><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2024\/04\/13\/gmail-and-youtube-hackers-bypass-googles-2fa-account-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><small>Forbes<\/small><\/em><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Aucun syst\u00e8me informatique n\u2019est inviolable, m\u00eame ceux que l\u2019on pensait les plus s\u00e9curis\u00e9s. Voil\u00e0 ce que nous apprend la d\u00e9couverte d\u2019une nouvelle campagne de piratage visant les comptes Gmail. La [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,195,11,181],"tags":[],"class_list":["post-6308","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-cyberespionnage","category-cybersecurite","category-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"Aucun syst\u00e8me informatique n\u2019est inviolable, m\u00eame ceux que l\u2019on pensait les plus s\u00e9curis\u00e9s. Voil\u00e0 ce que nous apprend la d\u00e9couverte d\u2019une nouvelle campagne de piratage visant les comptes Gmail. La [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T11:22:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-16T11:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"L\u00e9ticia KWABONG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"L\u00e9ticia KWABONG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/\"},\"author\":{\"name\":\"L\u00e9ticia KWABONG\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"headline\":\"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification\",\"datePublished\":\"2024-04-16T11:22:02+00:00\",\"dateModified\":\"2024-04-16T11:29:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/\"},\"wordCount\":566,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-25.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\",\"Internet\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/\",\"name\":\"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-25.jpg\",\"datePublished\":\"2024-04-16T11:22:02+00:00\",\"dateModified\":\"2024-04-16T11:29:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-25.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ab-25.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/04\\\/16\\\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/d25fa33e557eb1a1a17047a25737fda9\",\"name\":\"L\u00e9ticia KWABONG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g\",\"caption\":\"L\u00e9ticia KWABONG\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/leticia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/","og_locale":"fr_FR","og_type":"article","og_title":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - ParlonsTechs","og_description":"Aucun syst\u00e8me informatique n\u2019est inviolable, m\u00eame ceux que l\u2019on pensait les plus s\u00e9curis\u00e9s. Voil\u00e0 ce que nous apprend la d\u00e9couverte d\u2019une nouvelle campagne de piratage visant les comptes Gmail. La [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-04-16T11:22:02+00:00","article_modified_time":"2024-04-16T11:29:36+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-1.jpg","type":"image\/jpeg"}],"author":"L\u00e9ticia KWABONG","twitter_card":"summary_large_image","twitter_title":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/source-1.jpg","twitter_misc":{"\u00c9crit par":"L\u00e9ticia KWABONG","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/"},"author":{"name":"L\u00e9ticia KWABONG","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"headline":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification","datePublished":"2024-04-16T11:22:02+00:00","dateModified":"2024-04-16T11:29:36+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/"},"wordCount":566,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-25.jpg","articleSection":["Actualit\u00e9","Cyberespionnage","CyberS\u00e9curit\u00e9","Internet"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/","url":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/","name":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-25.jpg","datePublished":"2024-04-16T11:22:02+00:00","dateModified":"2024-04-16T11:29:36+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-25.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/04\/ab-25.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/04\/16\/gmail-prenez-garde-a-ce-piratage-qui-peut-meme-contourner-la-double-authentification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Gmail : prenez-garde \u00e0 ce piratage qui peut m\u00eame contourner la double authentification"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/d25fa33e557eb1a1a17047a25737fda9","name":"L\u00e9ticia KWABONG","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5fb929655d7fd32c2b102c28de8c2e556deb359b8fc3b9630cf6af142d574db?s=96&d=mm&r=g","caption":"L\u00e9ticia KWABONG"},"sameAs":["https:\/\/parlonstechs.com\/"],"url":"https:\/\/parlonstechs.com\/all\/author\/leticia\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=6308"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6308\/revisions"}],"predecessor-version":[{"id":6309,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6308\/revisions\/6309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/6310"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=6308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=6308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=6308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}