{"id":950,"date":"2015-09-21T13:35:29","date_gmt":"2015-09-21T12:35:29","guid":{"rendered":"http:\/\/mouillere.com\/universconvergents\/?p=950"},"modified":"2015-09-22T13:36:12","modified_gmt":"2015-09-22T12:36:12","slug":"les-visages-connus-et-inconnus-de-la-menace-informatique","status":"publish","type":"post","link":"https:\/\/mouillere.com\/universconvergents\/2015\/09\/21\/les-visages-connus-et-inconnus-de-la-menace-informatique\/","title":{"rendered":"Les visages connus et inconnus de la menace informatique"},"content":{"rendered":"<p>Services cloud, terminaux mobiles ou messagerie, chaque solution informatique am\u00e8ne son lot de nouveaux usages, mais aussi de risques pour la&#8230;<br \/>\n<a href=\"http:\/\/www.zdnet.fr\/actualites\/les-visages-connus-et-inconnus-de-la-menace-informatique-39825154.htm\" target=\"_blank\">http:\/\/www.zdnet.fr\/actualites\/les-visages-connus-et-inconnus-de-la-menace-informatique-39825154.htm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Services cloud, terminaux mobiles ou messagerie, chaque solution informatique am\u00e8ne son lot de nouveaux usages, mais aussi de risques pour la&#8230; http:\/\/www.zdnet.fr\/actualites\/les-visages-connus-et-inconnus-de-la-menace-informatique-39825154.htm<\/p>\n","protected":false},"author":1,"featured_media":951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20],"tags":[],"class_list":["post-950","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurite"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2015\/09\/sec16_visages-menace-info.jpg?fit=580%2C3254&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6jw1p-fk","jetpack-related-posts":[{"id":5810,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/01\/08\/menaces-informatiques-ciblant-le-secteur-des-telecommunications\/","url_meta":{"origin":950,"position":0},"title":"Menaces informatiques ciblant le secteur des t\u00e9l\u00e9communications","author":"Fred","date":"8 janvier 2024","format":false,"excerpt":"L\u2019ANSSI pr\u00e9sente les menace informatiques ciblant le secteur des t\u00e9l\u00e9communications supercritique au regard de leurs finalit\u00e9s lucratives, d'espionnage et de d\u00e9stabilisation. https:\/\/www.zdnet.fr\/actualites\/espionnage-et-exfiltration-de-donnees-l-anssi-devoile-le-plus-grand-danger-cyber-pour-le-secteur-des-telecoms-39963168.htm","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/01\/Virus.jpeg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6322,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/10\/27\/usages-de-lia-et-menaces-informatiques-pesant-sur-les-avocats-juristes\/","url_meta":{"origin":950,"position":1},"title":"Usages de l&#8217;IA et menaces informatiques pesant sur les Avocats &#038; Juristes","author":"Fred","date":"27 octobre 2024","format":false,"excerpt":"Wolters Kluwer vient de publier un rapport sur le futur des avocats et juristes, ce qui pose la question des usages de l'IA et des menaces informatiques pesant sur les professionnels du droit. L'IA accompagne les professionnels du droit principalement dans la recherche et la synth\u00e8se de la r\u00e8glementation et\u2026","rel":"","context":"Dans &quot;Avocat&quot;","block_context":{"text":"Avocat","link":"https:\/\/mouillere.com\/universconvergents\/category\/avocat\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/10\/2024-RapportAvocatsFaceAuFutur.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6155,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/07\/31\/rapport-sur-la-cybercriminalite-du-ministere-de-linterieur-et-des-outre-mer\/","url_meta":{"origin":950,"position":2},"title":"Rapport sur la cybercriminalit\u00e9 du minist\u00e8re de l\u2019Int\u00e9rieur et des Outre-mer","author":"Fred","date":"31 juillet 2024","format":false,"excerpt":"D\u00e9but 2023, le ministre de l\u2019Int\u00e9rieur et des Outre-mer a lanc\u00e9 un commandement cyber intitul\u00e9 COMCYBER-MI, associant diff\u00e9rents corps et services du minist\u00e8re (gendarmerie, police nationale, direction g\u00e9n\u00e9rale de la s\u00e9curit\u00e9 int\u00e9rieure, pr\u00e9fecture de police de Paris, personnels civils), afin d\u2019analyser les menaces num\u00e9riques pesant sur les citoyens, les entreprises\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/08\/Ecosysteme-Cybercriminel.png?fit=1200%2C799&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2487,"url":"https:\/\/mouillere.com\/universconvergents\/2017\/05\/30\/lanssi-lance-le-portail-cybermalveillance\/","url_meta":{"origin":950,"position":3},"title":"L&#8217;ANSSI lance le portail Cybermalveillance","author":"Fred","date":"30 mai 2017","format":false,"excerpt":"L\u2019Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (ANSSI) a lanc\u00e9 le portail internet\u00a0Cybermalveillance pour venir en aide aux particuliers, PME et administrations victimes de\u00a0piratage ou de vol de donn\u00e9es afin de leur permettre de trouver des prestataires susceptibles de leur venir en aide. Si l'ANSSI vient en aide directement\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2017\/06\/2017-06-05_122038.jpg?fit=1200%2C584&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3820,"url":"https:\/\/mouillere.com\/universconvergents\/2020\/03\/06\/ransomware-et-continuite-dactivite\/","url_meta":{"origin":950,"position":4},"title":"Ransomware et continuit\u00e9 d\u2019activit\u00e9","author":"Fred","date":"6 mars 2020","format":false,"excerpt":"L\u2019ANSSI a publi\u00e9 le 5 f\u00e9vrier 2020 son rapport sur \"l\u2019\u00e9tat de la menace ran\u00e7ongiciel \u00e0 l\u2019encontre des entreprises et institutions\". \"Un ran\u00e7ongiciel est un code malveillant emp\u00eachant la victime d\u2019acc\u00e9der au contenu de ses fichiers afin de lui extorquer de l\u2019argent\" \"Ces codes malveillants repr\u00e9sentent actuellement la menace informatique\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2020\/03\/Capture-d%E2%80%99e%CC%81cran-2020-03-06-a%CC%80-09.43.34.jpg?fit=1200%2C489&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6059,"url":"https:\/\/mouillere.com\/universconvergents\/2024\/06\/27\/1-3-des-collectivites-victimes-de-cyberattaques\/","url_meta":{"origin":950,"position":5},"title":"1\/3 des collectivit\u00e9s victimes de cyberattaques","author":"Fred","date":"27 juin 2024","format":false,"excerpt":"L\u2019entreprise de s\u00e9curit\u00e9 informatique Harfang Lab vient de publier une \u00e9tude consacr\u00e9e \u00e0 la cybers\u00e9curit\u00e9 des collectivit\u00e9s. Avec la num\u00e9risation des services publics, allant des syst\u00e8mes de gestion administrative aux services en ligne pour les citoyens, les collectivit\u00e9s sont de plus en plus expos\u00e9es aux cyberattaques qui peuvent paralyser les\u2026","rel":"","context":"Dans &quot;Cybers\u00e9curit\u00e9&quot;","block_context":{"text":"Cybers\u00e9curit\u00e9","link":"https:\/\/mouillere.com\/universconvergents\/category\/it\/cybersecurite\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/mouillere.com\/universconvergents\/wp-content\/uploads\/2024\/06\/2024-HarfangLab-Cybersecurite-CollectivitesTerritoriales.png?fit=1200%2C516&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/comments?post=950"}],"version-history":[{"count":1,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/950\/revisions"}],"predecessor-version":[{"id":952,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/posts\/950\/revisions\/952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media\/951"}],"wp:attachment":[{"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/media?parent=950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/categories?post=950"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mouillere.com\/universconvergents\/wp-json\/wp\/v2\/tags?post=950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}