{"id":1917,"date":"2016-03-08T09:37:17","date_gmt":"2016-03-08T08:37:17","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=1917"},"modified":"2016-03-08T09:37:17","modified_gmt":"2016-03-08T08:37:17","slug":"comment-a-ete-attaque-le-reseau-electrique-ukrainien-et-les-implications-sur-la-securite-de-linternet-des-objets","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2016\/03\/08\/comment-a-ete-attaque-le-reseau-electrique-ukrainien-et-les-implications-sur-la-securite-de-linternet-des-objets\/","title":{"rendered":"Comment a \u00e9t\u00e9 attaqu\u00e9 le r\u00e9seau \u00e9lectrique ukrainien (et les implications sur la s\u00e9curit\u00e9 de l&#8217;Internet des Objets)"},"content":{"rendered":"<p>Les cyber-attaques de d\u00e9cembre 2015 sur les compagnies d&#8217;\u00e9lectricit\u00e9 ukrainiennes sont rares : des dommages physiques s\u00e9v\u00e8res ont pu \u00eatre inflig\u00e9s. Mais elle sont de plus en plus importantes.<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/comment-a-ete-attaque-le-reseau-electrique-ukrainien-et-les-implications-sur-la-securite-de-l-internet-des-objets-39833726.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/comment-a-ete-attaque-le-reseau-electrique-ukrainien-et-les-implications-sur-la-securite-de-l-internet-des-objets-39833726.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cyber-attaques de d\u00e9cembre 2015 sur les compagnies d&#8217;\u00e9lectricit\u00e9 ukrainiennes sont rares : des dommages physiques s\u00e9v\u00e8res ont pu \u00eatre inflig\u00e9s. Mais elle sont de plus en plus importantes. http:\/\/www.zdnet.fr\/actualites\/comment-a-ete-attaque-le-reseau-electrique-ukrainien-et-les-implications-sur-la-securite-de-l-internet-des-objets-39833726.htm<\/p>\n","protected":false},"author":1,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-1917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1667%2C1152&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-uV","jetpack-related-posts":[{"id":348,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/20\/comment-linternet-des-objets-transforme-la-securite-dentreprise\/","url_meta":{"origin":1917,"position":0},"title":"Comment l&#8217;internet des objets transforme la s\u00e9curit\u00e9 d&#8217;entreprise","author":"Fred","date":"20 juillet 2015","format":false,"excerpt":"L'essor de l'internet des objets g\u00e9n\u00e8re un tout nouvel ensemble de d\u00e9fis li\u00e9s \u00e0 la s\u00e9curit\u00e9. Voici ce que les d\u00e9cideurs techniques doivent savoir... http:\/\/www.zdnet.fr\/actualites\/comment-l-internet-des-objets-transforme-la-securite-d-entreprise-39822396.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":363,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/07\/22\/securite-informatique-les-attaques-de-concurrents-se-multiplient\/","url_meta":{"origin":1917,"position":1},"title":"S\u00e9curit\u00e9 informatique : les attaques de concurrents se multiplient","author":"Fred","date":"22 juillet 2015","format":false,"excerpt":"Pour plus d'un tiers des entreprises fran\u00e7aises, ce constat entra\u00eene une hausse des budgets consacr\u00e9s \u00e0 la s\u00e9curit\u00e9 informatique affirme le cabinet... http:\/\/www.zdnet.fr\/actualites\/securite-informatique-les-attaques-de-concurrents-se-multiplient-39822698.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2499,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/06\/05\/projet-de-rapport-sur-la-lutte-contre-la-cybercriminalite\/","url_meta":{"origin":1917,"position":2},"title":"PROJET DE RAPPORT sur la lutte contre la cybercriminalit\u00e9","author":"Fred","date":"5 juin 2017","format":false,"excerpt":"La commission des libert\u00e9s civiles, de la justice et des affaires int\u00e9rieures (LIBE) du parlement europ\u00e9en a publi\u00e9 un projet de rapport sur la lutte contre la cybercriminalit\u00e9. \u00ab La cybercriminalit\u00e9 cause des dommages \u00e9conomiques et sociaux de plus en plus importants, ayant une incidence sur les droits fondamentaux des\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1196,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/10\/20\/internet-des-objets-iot-la-securite-en-questions\/","url_meta":{"origin":1917,"position":3},"title":"Internet des objets (IoT) : la s\u00e9curit\u00e9 en questions","author":"Fred","date":"20 octobre 2015","format":false,"excerpt":"La multiplication des objets connect\u00e9s \u00e0 Internet se confirme, qu'il s'agisse de liens de machines \u00e0 machines (M2M) ou d'objets port\u00e9s sur soi... http:\/\/www.zdnet.fr\/actualites\/internet-des-objets-iot-la-securite-en-questions-39826804.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/Internet-of-Things_secu.jpg?fit=610%2C493&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/Internet-of-Things_secu.jpg?fit=610%2C493&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/10\/Internet-of-Things_secu.jpg?fit=610%2C493&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":713,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/08\/27\/ue-vers-lobligation-pour-les-entreprises-du-numerique-a-devoiler-leurs-failles-de-securite\/","url_meta":{"origin":1917,"position":4},"title":"UE : vers l\u2019obligation pour les entreprises du num\u00e9rique \u00e0 d\u00e9voiler leurs failles de s\u00e9curit\u00e9 ?","author":"Fred","date":"27 ao\u00fbt 2015","format":false,"excerpt":"La future directive NIS leur imposerait de notifier les intrusions sur leurs syst\u00e8mes informatiques. A l'instar des obligations qui incombent d\u00e9j\u00e0 aux op\u00e9rateurs d'importance vitale. Un projet de directive europ\u00e9enne d\u00e9voil\u00e9 cet \u00e9t\u00e9 par l'agence de presse Reuters suscite de vives r\u00e9actions aupr\u00e8s des acteurs du secteur du num\u00e9rique. Si\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/06\/cyber-311111.jpg?fit=1000%2C664&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":1917,"position":5},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=1917"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1917\/revisions"}],"predecessor-version":[{"id":1918,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/1917\/revisions\/1918"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=1917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=1917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=1917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}