{"id":806,"date":"2015-09-08T09:26:09","date_gmt":"2015-09-08T08:26:09","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=806"},"modified":"2015-09-08T09:26:09","modified_gmt":"2015-09-08T08:26:09","slug":"linkedin-une-operation-de-phishing-vise-les-experts-de-la-securite","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/08\/linkedin-une-operation-de-phishing-vise-les-experts-de-la-securite\/","title":{"rendered":"LinkedIn : une op\u00e9ration de phishing vise les experts de la s\u00e9curit\u00e9"},"content":{"rendered":"<p>La soci\u00e9t\u00e9 F-Secure a mis en avant une op\u00e9ration de phishing visant les utilisateurs de LinkedIn dans le secteur de la s\u00e9curit\u00e9. Des faux comptes&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/linkedin-une-operation-de-phishing-vise-les-experts-de-la-securite-39824468.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/linkedin-une-operation-de-phishing-vise-les-experts-de-la-securite-39824468.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La soci\u00e9t\u00e9 F-Secure a mis en avant une op\u00e9ration de phishing visant les utilisateurs de LinkedIn dans le secteur de la s\u00e9curit\u00e9. Des faux comptes&#8230; http:\/\/www.zdnet.fr\/actualites\/linkedin-une-operation-de-phishing-vise-les-experts-de-la-securite-39824468.htm<\/p>\n","protected":false},"author":1,"featured_media":807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/talent-src-jennifer-white.png?fit=500%2C578&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-d0","jetpack-related-posts":[{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":806,"position":0},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6339,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/11\/05\/fuite-de-donnees-des-jeunes-des-missions-locales-apres-celle-des-chomeurs-de-france-travail\/","url_meta":{"origin":806,"position":1},"title":"Fuite de donn\u00e9es des jeunes des missions locales apr\u00e8s celle des ch\u00f4meurs de France Travail","author":"Fred","date":"5 novembre 2024","format":false,"excerpt":"Le minist\u00e8re du Travail et de l\u2019emploi vient de signaler le piratage du syst\u00e8me d\u2019information utilis\u00e9 par le r\u00e9seau des missions locales dans la nuit du 23 au 24 octobre 2024 avec un risque de divulgation des donn\u00e9es personnelles des 1,1 million de jeunes aid\u00e9s dans leur recherche d\u2019emploi ou\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/11\/2023-MissionsLocales-Chiffres.png?fit=1200%2C817&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":5842,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/22\/chiffrement-et-securite-des-donnees-dans-le-cloud\/","url_meta":{"origin":806,"position":2},"title":"Chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud","author":"Fred","date":"22 janvier 2024","format":false,"excerpt":"La CNIL vient de publier deux \u00a0fiches sur le chiffrement et s\u00e9curit\u00e9 des donn\u00e9es dans le Cloud. La s\u00e9curit\u00e9 est indispensable pour apporter la confiance dans la gestion des donn\u00e9es personnelles de l\u2019entreprise. En 2022, pr\u00e8s d\u2019un tiers des sanctions de la CNIL visaient des manquements aux obligations de s\u00e9curit\u00e9.\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Cloud.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1390,"url":"https:\/\/mouillere.com\/universconvergents\/2015\/11\/10\/medias-sociaux-linkedin-est-la-plateforme-a-mettre-en-oeuvre-pour-le-b-to-b\/","url_meta":{"origin":806,"position":3},"title":"M\u00e9dias sociaux : &#8216;LinkedIn est LA plateforme \u00e0 mettre en oeuvre pour le B to B&#8217;","author":"Fred","date":"10 novembre 2015","format":false,"excerpt":"Le BtoB a investi les m\u00e9dias sociaux, pour g\u00e9n\u00e9rer des leads, mais pas seulement. Le point avec Herv\u00e9 Kabla, directeur g\u00e9n\u00e9ral de Be Angels et auteur de 'M\u00e9dias sociaux et B2B : un mariage d'amour ?'. http:\/\/www.e-marketing.fr\/Thematique\/digital-data-1004\/Breves\/Medias-sociaux-LinkedIn-est-plateforme-mettre-oeuvre-261362.htm","rel":"","context":"Dans &quot;Marketing&amp;Communication&quot;","block_context":{"text":"Marketing&amp;Communication","link":"https:\/\/mouillere.com\/universconvergents\/category\/publicite-marketing-communication\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/Linkedin.png?fit=1200%2C443&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/Linkedin.png?fit=1200%2C443&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/Linkedin.png?fit=1200%2C443&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/Linkedin.png?fit=1200%2C443&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/11\/Linkedin.png?fit=1200%2C443&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2499,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/06\/05\/projet-de-rapport-sur-la-lutte-contre-la-cybercriminalite\/","url_meta":{"origin":806,"position":4},"title":"PROJET DE RAPPORT sur la lutte contre la cybercriminalit\u00e9","author":"Fred","date":"5 juin 2017","format":false,"excerpt":"La commission des libert\u00e9s civiles, de la justice et des affaires int\u00e9rieures (LIBE) du parlement europ\u00e9en a publi\u00e9 un projet de rapport sur la lutte contre la cybercriminalit\u00e9. \u00ab La cybercriminalit\u00e9 cause des dommages \u00e9conomiques et sociaux de plus en plus importants, ayant une incidence sur les droits fondamentaux des\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/07\/Cyber-Security.jpg?fit=1200%2C829&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2734,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/11\/28\/operateurs-de-services-essentiels-ose-et-operateurs-dimportance-vitale-oiv\/","url_meta":{"origin":806,"position":5},"title":"Op\u00e9rateurs de Services Essentiels (OSE) et Op\u00e9rateurs d\u2019Importance Vitale (OIV)","author":"Fred","date":"28 novembre 2017","format":false,"excerpt":"Suite \u00e0 l'entr\u00e9e en vigueur de la directive sur la s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes d\u2019information le 19 juillet 2016 pour\u00a0\u00ab assurer un niveau \u00e9lev\u00e9 commun de s\u00e9curit\u00e9 des r\u00e9seaux et des syst\u00e8mes d'information dans l'Union \u00bb, le gouvernement fran\u00e7ais vient de d\u00e9poser une projet de loi\u00a0transposant la directive\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/nis_chronologie_fr.png?fit=800%2C834&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/nis_chronologie_fr.png?fit=800%2C834&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/nis_chronologie_fr.png?fit=800%2C834&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/11\/nis_chronologie_fr.png?fit=800%2C834&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=806"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/806\/revisions"}],"predecessor-version":[{"id":808,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/806\/revisions\/808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/807"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}