{"id":2161,"date":"2022-08-25T17:38:45","date_gmt":"2022-08-25T15:38:45","guid":{"rendered":"http:\/\/xbgnygylyr.cyon.link\/les-appats-des-phishers\/"},"modified":"2022-10-28T09:04:32","modified_gmt":"2022-10-28T07:04:32","slug":"les-appats-des-phishers","status":"publish","type":"post","link":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/","title":{"rendered":"Les app\u00e2ts des phishers"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n\t<div class=\"post-lead-holder\">\n\t\t<p>Le bonheur des uns fait le malheur des autres. Il en va de m\u00eame pour le phishing, qui consiste \u00e0 tenter d&rsquo;obtenir vos donn\u00e9es personnelles et vos mots de passe par tromperie. Les techniques utilis\u00e9es varient, et les attaques ont tripl\u00e9 depuis d\u00e9but 2020. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge, voire \u00e0 servir d&rsquo;app\u00e2t.<\/p>\n\t<\/div>\n\n\n\n\t<div class=\"post-attribute-holder\">\n\t\t<span class=\"bsf-rt-reading-time\"><span class=\"bsf-rt-display-label\" prefix=\"Reading Time\">\n\t\t<\/span> <span class=\"bsf-rt-display-time\" reading_time=\"3\"><\/span> \n\t\t<span class=\"bsf-rt-display-postfix\" postfix=\"mins\"><\/span><\/span>min. de lecture-25.08.2022 \u2013 \n\t\tPhotos: Unsplash\t<\/div>\n\n\n\n<p>Le phishing est efficace lorsque les fraudeurs obtiennent des mots de passe et d&rsquo;autres donn\u00e9es sensibles et les utilisent pour causer des dommages, tels que prendre le contr\u00f4le d&rsquo;un compte, usurper l&rsquo;identit\u00e9 d&rsquo;une personne, espionner les gens sur leur propre ordinateur ou faire dispara\u00eetre des donn\u00e9es personnelles. En outre, cela peut aussi faire des d\u00e9g\u00e2ts dans sa propre entreprise ou dans celle dans laquelle on travaille. <\/p>\n\n\n\n<p><strong>Les cyberattaques ou les extorsions par phishing \u2013 appel\u00e9es attaques par ransomware \u2013 peuvent causer des dommages importants, ce qui peut parfois entra\u00eener la perte compl\u00e8te des donn\u00e9es et des syst\u00e8mes. <\/strong><\/p>\n\n\n\n<p>Comme la p\u00eache, le phishing utilise de nombreuses techniques. Ici, vous en saurez plus sur les types de phishing les plus importants et les plus r\u00e9pandus. <\/p>\n\n\n\n<figure class=\"wp-block-image size-mid-size\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-1000x562.jpg\" alt=\"\" class=\"wp-image-2152\" srcset=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-1000x562.jpg 1000w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-300x169.jpg 300w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-1024x576.jpg 1024w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-768x432.jpg 768w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-1536x864.jpg 1536w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-500x281.jpg 500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900-1500x843.jpg 1500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/2_schwarm_ePvBOHsAA54_1600x900.jpg 1600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption>Unsplash, @wimmerlin<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Spray and pray phishing<\/strong><\/h2>\n\n\n\n<p>La fa\u00e7on la plus simple d&rsquo;utiliser le phishing pour tenter d&rsquo;acc\u00e9der \u00e0 vos donn\u00e9es est d&rsquo;envoyer un message plus ou moins authentique en apparence \u00e0 des millions d&rsquo;adresses e-mail. L&rsquo;exp\u00e9diteur esp\u00e8re, comme \u00e0 la p\u00eache \u00e0 la ligne, qu&rsquo;au moins quelques-uns des destinataires mordront \u00e0 l&rsquo;hame\u00e7on. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900.jpg\" alt=\"\" class=\"wp-image-2153\" srcset=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900.jpg 1600w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-300x169.jpg 300w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-1024x576.jpg 1024w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-768x432.jpg 768w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-1536x864.jpg 1536w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-1000x562.jpg 1000w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-500x281.jpg 500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/3_goldfisch_KIMnz-fU-68_1600x900-1500x843.jpg 1500w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><figcaption>Unsplash: @antoinepeltier<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Clone phishing<\/strong><\/h2>\n\n\n\n<p>L&rsquo;attaque par clone phishing consiste \u00e0 faire une copie d&rsquo;un e-mail authentique envoy\u00e9 pr\u00e9c\u00e9demment en y rempla\u00e7ant les pi\u00e8ces jointes ou les liens par un malware ou une page d&rsquo;atterrissage de phishing. L&rsquo;e-mail est falsifi\u00e9 de telle sorte qu&rsquo;il semble avoir \u00e9t\u00e9 envoy\u00e9 de nouveau par l&rsquo;exp\u00e9diteur d&rsquo;origine. En r\u00e8gle g\u00e9n\u00e9rale, l&rsquo;e-mail est adress\u00e9 \u00e0 un grand nombre de destinataires. L&rsquo;auteur de l&rsquo;attaque attend que les victimes cliquent dessus. Ce type d&rsquo;attaque est consid\u00e9r\u00e9 comme le plus dangereux, car il est difficile pour les victimes de d\u00e9tecter un faux e-mail.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-1024x576.jpg\" alt=\"\" class=\"wp-image-2154\" srcset=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-1024x576.jpg 1024w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-300x169.jpg 300w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-768x432.jpg 768w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-1536x864.jpg 1536w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-1000x562.jpg 1000w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-500x281.jpg 500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900-1500x843.jpg 1500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/4_spear-P4U03oep_1600x900.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Unsplash: @castandspear<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Spear phishing<\/strong><\/h2>\n\n\n\n<p>Avec la canne \u00e0 p\u00eache, vous pouvez p\u00eacher beaucoup de choses sous la surface de l&rsquo;eau: une truite, une perche ou un morceau de plastique. Lorsque vous p\u00eachez au harpon, vous partez \u00e0 la chasse d&rsquo;un poisson bien particulier. Les e-mails de spear phishing sont personnalis\u00e9s, ce qui les rend plus cr\u00e9dibles. Un cyberattaquant sait par exemple comment vous vous appelez, que vous utilisez un logiciel particulier ou du moins il suppose que vous l&rsquo;utilisez \u2013 presque tout le monde utilise Microsoft Office aujourd&rsquo;hui. Il envoie donc un e-mail avec une formule d&rsquo;adresse personnalis\u00e9e, qui ressemble \u00e0 une notification vous demandant de mettre \u00e0 jour votre mot de passe. Le lien sur lequel vous cliquez dans l&rsquo;e-mail m\u00e8ne \u00e0 une page qui ressemble beaucoup au vrai masque de connexion. En r\u00e9alit\u00e9, il s&rsquo;agit d&rsquo;une fausse URL contr\u00f4l\u00e9e par l&rsquo;escroc. Vous \u00eates ensuite invit\u00e9(e) \u00e0 saisir votre nom d&rsquo;utilisateur et votre mot de passe actuel. Et voil\u00e0 comment le cyberattaquant r\u00e9ussit \u00e0 acc\u00e9der \u00e0 votre compte Microsoft. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-1024x576.jpg\" alt=\"\" class=\"wp-image-2155\" srcset=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-1024x576.jpg 1024w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-300x169.jpg 300w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-768x432.jpg 768w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-1536x864.jpg 1536w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-1000x562.jpg 1000w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-500x281.jpg 500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900-1500x843.jpg 1500w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/5_whale_QnBrjY-nFUs_1600x900.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>unsplash: @toddcravens<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Whale phishing (whaling)<\/strong><\/h2>\n\n\n\n<p>Le whaling (\u00abchasse \u00e0 la baleine\u00bb en anglais) est un type de phishing encore plus cibl\u00e9, car il vise les gros \u00abpoissons\u00bb. Ces attaques ciblent g\u00e9n\u00e9ralement le CEO ou un autre membre de la direction d&rsquo;une entreprise donn\u00e9e.\n\n<\/p>\n\n\n\n<p>Mais le whale phishing s&rsquo;adresse aussi aux personnes fortun\u00e9es, puissantes ou influentes. Il ne s&rsquo;agit pas d&rsquo;une attaque aveugle comme une tentative de phishing ordinaire. Les cybercriminels attaquent de plus en plus souvent le chef d&rsquo;entreprise \u2013 autrement dit la \u00abbaleine\u00bb \u2013 car ils peuvent acc\u00e9der \u00e0 des informations et \u00e0 des ressources auxquelles d&rsquo;autres n&rsquo;ont pas acc\u00e8s. <\/p>\n\n\n\n    <div class=\"select-post-holder flex-container section layout-article-teaser\">\n     <div class=\"container\">\n       \n                   \n                 \n     <div class=\"select-post flex-item square\">\n                           \n                                 \n                  <div class=\"featured-image-holder\">\n                     <a href=\"https:\/\/www.mycard.ch\/fr\/protegez-vous-du-phishing\/\">\n                       <div class=\"featured-iamge\">\n                         <img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/no_Phishing_1600x900-400x400.jpg\" class=\"attachment-mid-size-q size-mid-size-q wp-post-image\" alt=\"\" srcset=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/no_Phishing_1600x900-400x400.jpg 400w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/no_Phishing_1600x900-150x150.jpg 150w, https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/no_Phishing_1600x900-200x200.jpg 200w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/>                       <\/div>\n                     <\/a>\t\n                   <\/div>\n                   \n                   <div class=\"featured-content\">\n                      <a href=\"https:\/\/www.mycard.ch\/fr\/protegez-vous-du-phishing\/\">\n                       <h2>Prot\u00e9gez-vous du phishing!<\/h2>\n                       <span class=\"reading-time\"><span class=\"bsf-rt-reading-time\"><span class=\"bsf-rt-display-label\" prefix=\"Reading Time\">\n\t\t<\/span> <span class=\"bsf-rt-display-time\" reading_time=\"2\"><\/span> \n\t\t<span class=\"bsf-rt-display-postfix\" postfix=\"mins\"><\/span><\/span>min. de lecture<\/span>\n                       <\/a>\t\n                  <\/div>\n                     \n                              \n            \n               \n               \n                 \n\n                  <\/div>    \n                      \n                   \n       \n     <\/div> \n   <\/div>  \n\n\n\n<h2 class=\"wp-block-heading\"><strong>Fraude au CEO \u2013 quand le patron frappe<\/strong><\/h2>\n\n\n\n<p>Dans le cas de la fraude au CEO, ce dernier est \u00e9galement impliqu\u00e9 dans la tentative d&rsquo;escroquerie, mais comme app\u00e2t. Les fraudeurs envoient un e-mail \u00e0 un collaborateur, qui travaille g\u00e9n\u00e9ralement dans le service comptable ou financier, en se faisant passer pour le CEO de l&rsquo;entreprise. Le collaborateur est ensuite invit\u00e9 \u00e0 virer de l&rsquo;argent sur un (faux) compte. Les fraudeurs partent du principe que les e-mails provenant de la direction ne suscitent que peu de m\u00e9fiance. <\/p>\n\n\n\n<div class=\"wp-block-group red box has-background\" style=\"background-color:#d0021b\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"has-white-color has-text-color wp-block-heading\"><strong>Phishing\/smishing\/vishing<\/strong><\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">Le phishing est aujourd&rsquo;hui la technique de cyberattaque la plus couramment utilis\u00e9e, car il peut causer des dommages importants avec relativement peu d&rsquo;efforts et \u00e0 moindre co\u00fbt. Le mot phishing est compos\u00e9 des deux termes anglais <em>password harvesting<\/em> (r\u00e9colte de mots de passe) et <em>fishing<\/em> (p\u00eache) et d\u00e9signe principalement les tentatives d&rsquo;escroquerie par e-mail. Par analogie, on emploie le terme de smishing pour d\u00e9signer le phishing par SMS. Ces SMS promettent souvent de pr\u00e9tendus codes de r\u00e9duction, billets gratuits pour des \u00e9v\u00e9nements ou autres avantages.<\/p>\n\n\n\n<p class=\"has-white-color has-text-color\">Avec le vishing ou voice phishing, les cybercriminels essaient de vous escroquer par t\u00e9l\u00e9phone. Ils se font par exemple passer pour un \u00e9metteur de cartes de cr\u00e9dit, un policier ou un agent du support Microsoft et tentent d&rsquo;acc\u00e9der \u00e0 votre PC ou \u00e0 vos donn\u00e9es. <\/p>\n\n\n\n<p class=\"has-white-color has-text-color\"><strong>Ne r\u00e9pondez donc jamais \u00e0 des e-mails, SMS et appels d&rsquo;origine inconnue.<\/strong><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link\" href=\"https:\/\/votrepolice.ch\/cybercriminalite-cat\/\" target=\"_blank\" rel=\"noreferrer noopener\">En savoir plus sur les cas de phishing actuels<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Le phishing est efficace lorsque les fraudeurs obtiennent des mots de passe et d&rsquo;autres donn\u00e9es sensibles et les utilisent pour causer des dommages, tels que prendre le contr\u00f4le d&rsquo;un compte, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2166,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[53],"tags":[],"class_list":["post-2161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-renforcee"],"acf":{"show_content_below_image":[],"publizieren_auf":["mycard"]},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les app\u00e2ts des phishers - MyCard<\/title>\n<meta name=\"description\" content=\"Qu&#039;il s&#039;agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les app\u00e2ts des phishers - MyCard\" \/>\n<meta property=\"og:description\" content=\"Qu&#039;il s&#039;agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\" \/>\n<meta property=\"og:site_name\" content=\"MyCard\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-25T15:38:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-28T07:04:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bojan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bojan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\"},\"author\":{\"name\":\"Bojan\",\"@id\":\"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350\"},\"headline\":\"Les app\u00e2ts des phishers\",\"datePublished\":\"2022-08-25T15:38:45+00:00\",\"dateModified\":\"2022-10-28T07:04:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\"},\"wordCount\":869,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg\",\"articleSection\":[\"S\u00e9curit\u00e9 renforc\u00e9e\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\",\"url\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\",\"name\":\"Les app\u00e2ts des phishers - MyCard\",\"isPartOf\":{\"@id\":\"https:\/\/www.mycard.ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg\",\"datePublished\":\"2022-08-25T15:38:45+00:00\",\"dateModified\":\"2022-10-28T07:04:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350\"},\"description\":\"Qu'il s'agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage\",\"url\":\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg\",\"contentUrl\":\"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.mycard.ch\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les app\u00e2ts des phishers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mycard.ch\/#website\",\"url\":\"https:\/\/www.mycard.ch\/\",\"name\":\"MyCard\",\"description\":\"das Kundenmagazin der Viseca Card Services SA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mycard.ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350\",\"name\":\"Bojan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mycard.ch\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1ac6150a15edeb7f3f21935221658c9422f5d2edc3bf33bbc3ea997464f70d1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1ac6150a15edeb7f3f21935221658c9422f5d2edc3bf33bbc3ea997464f70d1d?s=96&d=mm&r=g\",\"caption\":\"Bojan\"},\"url\":\"https:\/\/www.mycard.ch\/fr\/author\/bojan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les app\u00e2ts des phishers - MyCard","description":"Qu'il s'agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/","og_locale":"fr_FR","og_type":"article","og_title":"Les app\u00e2ts des phishers - MyCard","og_description":"Qu'il s'agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.","og_url":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/","og_site_name":"MyCard","article_published_time":"2022-08-25T15:38:45+00:00","article_modified_time":"2022-10-28T07:04:32+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg","type":"image\/jpeg"}],"author":"Bojan","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Bojan","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#article","isPartOf":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/"},"author":{"name":"Bojan","@id":"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350"},"headline":"Les app\u00e2ts des phishers","datePublished":"2022-08-25T15:38:45+00:00","dateModified":"2022-10-28T07:04:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/"},"wordCount":869,"commentCount":0,"image":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg","articleSection":["S\u00e9curit\u00e9 renforc\u00e9e"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/","url":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/","name":"Les app\u00e2ts des phishers - MyCard","isPartOf":{"@id":"https:\/\/www.mycard.ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage"},"image":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg","datePublished":"2022-08-25T15:38:45+00:00","dateModified":"2022-10-28T07:04:32+00:00","author":{"@id":"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350"},"description":"Qu'il s'agisse de phishing, de smishing ou de vishing, les techniques utilis\u00e9es pour aller \u00e0 la \u00abp\u00eache\u00bb aux donn\u00e9es varient. Veillez \u00e0 ne pas tomber dans le pi\u00e8ge.","breadcrumb":{"@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#primaryimage","url":"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg","contentUrl":"https:\/\/www.mycard.ch\/wp-content\/uploads\/2022\/08\/1_header_viq9Ztqi3Vc_1600x900-1.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.mycard.ch\/fr\/les-appats-des-phishers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.mycard.ch\/fr\/"},{"@type":"ListItem","position":2,"name":"Les app\u00e2ts des phishers"}]},{"@type":"WebSite","@id":"https:\/\/www.mycard.ch\/#website","url":"https:\/\/www.mycard.ch\/","name":"MyCard","description":"das Kundenmagazin der Viseca Card Services SA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mycard.ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.mycard.ch\/#\/schema\/person\/2bf90bf839410d3bee77b07ab7e17350","name":"Bojan","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mycard.ch\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1ac6150a15edeb7f3f21935221658c9422f5d2edc3bf33bbc3ea997464f70d1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ac6150a15edeb7f3f21935221658c9422f5d2edc3bf33bbc3ea997464f70d1d?s=96&d=mm&r=g","caption":"Bojan"},"url":"https:\/\/www.mycard.ch\/fr\/author\/bojan\/"}]}},"wpml_translations":{"de":{"id":"2150","lang":"de","slug":"die-koeder-der-phisher"},"fr":{"id":"2161","lang":"fr","slug":"les-appats-des-phishers"},"it":{"id":"2163","lang":"it","slug":"le-esche-dei-phisher"}},"publishpress_future_action":{"enabled":false,"date":"2026-05-05 23:40:22","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/posts\/2161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/comments?post=2161"}],"version-history":[{"count":7,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/posts\/2161\/revisions"}],"predecessor-version":[{"id":2967,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/posts\/2161\/revisions\/2967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/media\/2166"}],"wp:attachment":[{"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/media?parent=2161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/categories?post=2161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mycard.ch\/fr\/wp-json\/wp\/v2\/tags?post=2161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}