
{"id":6699,"date":"2024-07-04T04:29:28","date_gmt":"2024-07-04T02:29:28","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=6699"},"modified":"2024-07-04T04:29:58","modified_gmt":"2024-07-04T02:29:58","slug":"cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/","title":{"rendered":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.wearetech.africa\/media\/k2\/items\/cache\/36fd63aa557e6cf7be5bbcd94186bbdc_L.jpg\" alt=\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - We are Tech\" \/><\/p>\n<h2><strong><span class=\"texte\">La cybers\u00e9curit\u00e9 est devenue, au fil des ann\u00e9es, l\u2019une des pr\u00e9occupations majeures des pays africains. La r\u00e9volution technologique en cours dans le monde, \u00e0 laquelle prennent activement part les pays d\u2019Afrique, a mis en lumi\u00e8re les failles du cyberespace africain.<\/span><\/strong><\/h2>\n<p class=\"texte\">Le lundi 1er juillet, la multinationale russe sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information Kaspersky donne 4 recommandations pour se prot\u00e9ger des cybercriminels sp\u00e9cialis\u00e9s dans l&rsquo;escroquerie en ligne en Afrique de l\u2019Ouest (brouteurs). La g\u00e9n\u00e9ration de mots de passe complexes, la m\u00e9fiance vis-\u00e0-vis des SMS suspects, la recherche du symbole du cadenas sur les sites Internet et le t\u00e9l\u00e9chargement d&rsquo;applications de sources fiables sont autant de recommandations faites par Kaspersky.<\/p>\n<p class=\"texte\">Ces conseils font suite \u00e0 une \u00e9tude r\u00e9alis\u00e9e aupr\u00e8s de 200 personnes en janvier 2024 par l\u2019entreprise russe de cybers\u00e9curit\u00e9 sur l&rsquo;utilisation des t\u00e9l\u00e9phones mobiles en Afrique de l&rsquo;Ouest. Elle met en lumi\u00e8re les menaces croissantes pos\u00e9es par les \u00ab\u00a0brouteurs\u00a0\u00bb dont l&rsquo;activit\u00e9 nuit gravement \u00e0 la confiance et \u00e0 la s\u00e9curit\u00e9 num\u00e9rique dans la r\u00e9gion. Leurs faits d&rsquo;armes vont de l\u2019usurpation des r\u00e9seaux sociaux, des faux pr\u00eats et bourses, des achats en ligne et contrefa\u00e7on aux concours et comp\u00e9titions, aux escroqueries en mati\u00e8re de\u00a0 sant\u00e9 et beaut\u00e9, par webcam et acc\u00e8s \u00e0 distance.<\/p>\n<p class=\"texte\"><em>\u00ab\u00a0Avec l&rsquo;acc\u00e8s croissant \u00e0 Internet en Afrique de l\u2019Ouest, la s\u00e9curit\u00e9 en ligne devient une pr\u00e9occupation pour les populations locales. En C\u00f4te d&rsquo;Ivoire et au S\u00e9n\u00e9gal, 46% de la population se connecte quotidiennement \u00e0 Internet, soit environ 9,6 millions d&rsquo;internautes.<\/em>\u00a0[&#8230;]\u00a0<em>50,5% des Ivoiriens et S\u00e9n\u00e9galais utilisent leurs t\u00e9l\u00e9phones mobiles quotidiennement pour des besoins professionnels et personnels. Les r\u00e9seaux sociaux sont utilis\u00e9s par 87,7% des utilisateurs, suivis des appels vid\u00e9o (68,1%) et des applications de g\u00e9olocalisation (60,8%)\u00a0\u00bb,<\/em>\u00a0souligne Kaspersky.<\/p>\n<p class=\"texte\">Selon Kaspersky, la connectivit\u00e9 accrue expose les utilisateurs \u00e0 divers risques de cybercriminalit\u00e9, y compris les arnaques sentimentales qui exploitent les r\u00e9seaux sociaux et les plateformes de communication. Ces arnaques ont caus\u00e9 plus de 1,3 milliard $ de pertes mondiales entre 2017 et 2022, avec une perte moyenne de 4 400 $ par victime, selon Interpol.<\/p>\n<p class=\"texte\">En Afrique, les questions de cybers\u00e9curit\u00e9 sont encore peu abord\u00e9es au niveau national par manque de comp\u00e9tences ou d&rsquo;infrastructures. Selon l\u2019\u00e9dition 2020 du rapport \u00ab\u00a0Global Cybersecurity Index\u00a0\u00bb publi\u00e9 par l\u2019Union internationale des t\u00e9l\u00e9communications, les indices de cybers\u00e9curit\u00e9 de la C\u00f4te d\u2019Ivoire et du S\u00e9n\u00e9gal se sont respectivement \u00e9tablis \u00e0 67,82 (11<sup>e<\/sup>\u00a0place) et \u00e0 35,85 (18<sup>e<\/sup>\u00a0place). Plusieurs pays de la r\u00e9gion, tels que le Mali (10,14), le Niger (11,36) ou encore la Guin\u00e9e (20,53), sont plus vuln\u00e9rables.<\/p>\n<p class=\"texte\">Par ailleurs, les autorit\u00e9s des divers pays prennent de plus en plus de mesures pour assainir leurs cyberespaces. Entre autres, elles mettent en place des strat\u00e9gies nationales de cybers\u00e9curit\u00e9, mettent en place des \u00e9quipes nationales de r\u00e9ponse aux incidents informatiques, adh\u00e8rent \u00e0 des conventions comme celle de Malabo sur la cybers\u00e9curit\u00e9 et les donn\u00e9es \u00e0 caract\u00e8re personnel ou celle de Budapest sur la cybercriminalit\u00e9.<\/p>\n<p class=\"texte\"><strong><em>Adoni Conrad Quenum<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cybers\u00e9curit\u00e9 est devenue, au fil des ann\u00e9es, l\u2019une des pr\u00e9occupations majeures des pays africains. La r\u00e9volution technologique en cours dans le monde, \u00e0 laquelle prennent activement part les pays [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6700,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,71,195,11,12],"tags":[],"class_list":["post-6699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-astuce","category-cyberespionnage","category-cybersecurite","category-logiciels"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - ParlonsTechs\" \/>\n<meta property=\"og:description\" content=\"La cybers\u00e9curit\u00e9 est devenue, au fil des ann\u00e9es, l\u2019une des pr\u00e9occupations majeures des pays africains. La r\u00e9volution technologique en cours dans le monde, \u00e0 laquelle prennent activement part les pays [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-04T02:29:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-04T02:29:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/s_social-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - ParlonsTechs\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/s_social-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile\",\"datePublished\":\"2024-07-04T02:29:28+00:00\",\"dateModified\":\"2024-07-04T02:29:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/\"},\"wordCount\":549,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ab-1.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Astuce\",\"Cyberespionnage\",\"CyberS\u00e9curit\u00e9\",\"Logiciels\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ab-1.jpg\",\"datePublished\":\"2024-07-04T02:29:28+00:00\",\"dateModified\":\"2024-07-04T02:29:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ab-1.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/ab-1.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2024\\\/07\\\/04\\\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - ParlonsTechs","og_description":"La cybers\u00e9curit\u00e9 est devenue, au fil des ann\u00e9es, l\u2019une des pr\u00e9occupations majeures des pays africains. La r\u00e9volution technologique en cours dans le monde, \u00e0 laquelle prennent activement part les pays [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/","og_site_name":"Parlons Techs - Store","article_published_time":"2024-07-04T02:29:28+00:00","article_modified_time":"2024-07-04T02:29:58+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/s_social-1.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - ParlonsTechs","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/s_social-1.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile","datePublished":"2024-07-04T02:29:28+00:00","dateModified":"2024-07-04T02:29:58+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/"},"wordCount":549,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/ab-1.jpg","articleSection":["Actualit\u00e9","Astuce","Cyberespionnage","CyberS\u00e9curit\u00e9","Logiciels"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/","url":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/","name":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/ab-1.jpg","datePublished":"2024-07-04T02:29:28+00:00","dateModified":"2024-07-04T02:29:58+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/ab-1.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2024\/07\/ab-1.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2024\/07\/04\/cybersecurite-4-recommandations-de-kaspersky-pour-se-proteger-sur-mobile\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 : 4 recommandations de Kaspersky pour se prot\u00e9ger sur mobile"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=6699"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6699\/revisions"}],"predecessor-version":[{"id":6702,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/6699\/revisions\/6702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/6700"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=6699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=6699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=6699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}