{"id":34546,"date":"2023-12-19T18:07:02","date_gmt":"2023-12-19T18:07:02","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=34546"},"modified":"2024-01-04T16:44:01","modified_gmt":"2024-01-04T16:44:01","slug":"deuxieme-saison-channel","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/","title":{"rendered":"Deuxi\u00e8me saison Channel"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb max_width=\u00a0\u00bb2560px\u00a0\u00bb custom_margin=\u00a0\u00bb150px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|||10%|false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb|5%||5%|false|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb header_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb header_font_size=\u00a0\u00bb60px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||||false|false\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; header_font_size_tablet=\u00a0\u00bb60px\u00a0\u00bb header_font_size_phone=\u00a0\u00bb42px\u00a0\u00bb header_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h1>Deuxi\u00e8me saison<br \/>\nNouvelles de derni\u00e8re heure sur la cybers\u00e9curit\u00e9<\/span><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>Channel Training\/<span style=\"color: #f18a00;\">\u00c9pisodes saison&nbsp;2<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|tablet\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_color=\u00a0\u00bboff\u00a0\u00bb background_image=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00a0\u00bb custom_margin=\u00a0\u00bb|||0px|false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px||0px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/1-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.1&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.1&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">TOUS FOUS DE R\u00c9DUCTIONS\/WATERING HOLE (POINT D\u2019EAU) <\/span><br \/>\nDans cet \u00e9pisode, nous analysons encore une fois ce qu\u2019est une technique de cyberattaque emprunt\u00e9e \u00e0 la nature&nbsp;: la technique du point d\u2019eau (watering hole). L\u2019attaquant, comme un crocodile, se met en attente de sa victime.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/2-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.2&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.2&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNE P\u00caCHE FRUCTUEUSE\/ARNAQUE WHATSAPP <\/span><br \/>\nDans cet \u00e9pisode, nous racontons une escroquerie, qui frappe un dirigeant \u00ab&nbsp;technologiquement non pr\u00e9par\u00e9&nbsp;\u00bb. C\u2019est une escroquerie bas\u00e9e sur une manipulation psychologique dans laquelle le pirate, camoufl\u00e9 derri\u00e8re une fausse identit\u00e9, r\u00e9ussit dans ses intentions criminelles.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/3-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.3&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.3&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">PAR T\u00c9L\u00c9PHONE\/VISHING ET VOL DE DONN\u00c9ES <\/span><br \/>\nNous sommes de plus en plus habitu\u00e9s \u00e0 recevoir des appels t\u00e9l\u00e9phoniques d\u2019op\u00e9rateurs, nous informant de modifications unilat\u00e9rales des contrats que nous avons conclus. La perception du risque dans ces appels a diminu\u00e9 au point de fournir les donn\u00e9es sensibles de la carte de cr\u00e9dit.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/4-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.4&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.4&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">PARKINGS \u00ab&nbsp;DANGEREUX&nbsp;\u00bb\/QUISHING <\/span><br \/>Dans cet \u00e9pisode, nous explorons une arnaque r\u00e9cemment r\u00e9pandue, qui s\u2019appuie sur un code de plus en plus utilis\u00e9&nbsp;: le QR code. Le m\u00e9canisme trompeur de base est le m\u00eame que celui adopt\u00e9 pour le phishing&nbsp;: convaincre la victime potentielle d\u2019effectuer une action.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/5-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.5&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.5&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">ESSAYER, MAIS SANS OUBLIER\/FAUX SITE WEB <\/span><br \/>\nDistinguer le vrai du faux dans la dimension num\u00e9rique peut \u00eatre un exercice tr\u00e8s difficile. Le danger de devenir les victimes d\u00e9sign\u00e9es des cybercriminels est toujours r\u00e9el. Comment nous prot\u00e9ger&nbsp;? En recourant \u00e0 des comportements num\u00e9riques vertueux.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/6-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.6&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.6&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">COPIE AVEC TROP DE CONNAISSANCES\/ARNAQUE AU PDG <\/span><br \/>\nCompromettre les comptes d\u2019entreprise et l\u2019infiltration des \u00e9changes de courrier \u00e9lectronique des entreprises sont les menaces qui peuplent les pires cauchemars des cadres sup\u00e9rieurs, surtout si les intrus savent parfaitement comment se camoufler.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/7-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.7&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.7&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">PHOTOS SOUVENIR&#8230; \u00c0 OUBLIER\/PROTECTION DES DONN\u00c9ES <\/span><br \/>\nDe nos jours, la simplicit\u00e9 avec laquelle nous partageons des donn\u00e9es et des informations peut g\u00e9n\u00e9rer des situations tr\u00e8s critiques pour notre vie priv\u00e9e. Cependant, suivre quelques simples pr\u00e9cautions comportementales peut nous mettre \u00e0 l\u2019abri des partages \u00ab&nbsp;indiscrets&nbsp;\u00bb.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/8-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.8&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.8&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">D\u00c9TENTION D\u2019E-MAIL\/SPEAR PHISHING <\/span><br \/>Le phishing est une technique d\u2019attaque informatique qui peut prendre diff\u00e9rentes formes en fonction du contexte. Les attaques par spear phishing, comme celle rapport\u00e9e dans cet \u00e9pisode, sont g\u00e9n\u00e9ralement plus pr\u00e9cises, mais loin d\u2019\u00eatre \u00ab&nbsp;parfaites&nbsp;\u00bb.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/9-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.9&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.9&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">AU-DEL\u00c0 DES APPARENCES\/FAKE NEWS (FAUSSES NOUVELLES) <\/span><br \/>\nCet \u00e9pisode approfondit la menace qui se cache derri\u00e8re les fausses nouvelles, peuplant d\u00e9sormais tranquillement le r\u00e9seau. Avant de croire \u00e0 une nouvelle sensationnelle trouv\u00e9e sur le Web, nous devons la soumettre \u00e0 un examen approfondi.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_padding=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_divider color=\u00a0\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00a0\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb2&Prime; make_equal=\u00a0\u00bbon\u00a0\u00bb custom_padding_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb\u00a0\u00bb custom_margin_phone=\u00a0\u00bb\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bbon|desktop\u00a0\u00bb custom_padding=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb50px||||false|false\u00a0\u00bb custom_padding_phone=\u00a0\u00bb50px||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/10-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.10&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.10&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UN \u00ab&nbsp;FAUX&nbsp;\u00bb DON\/PHARMING <\/span><br \/>Cet \u00e9pisode met en \u00e9vidence une technique d\u2019attaque particuli\u00e8rement sournoise, qui a pris un nom particulier dans la cr\u00e9ativit\u00e9 des sp\u00e9cialistes de la cybers\u00e9curit\u00e9&nbsp;: le pharming, \u00e9tant la technique du site clon\u00e9. Mais qu\u2019est-ce que le pharming&nbsp;?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/11-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.11&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.11&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">POSTS DANGEREUX\/CONFIDENTIALIT\u00c9 <\/span><br \/>\n\u00c0 l\u2019\u00e8re du partage via les r\u00e9seaux sociaux, la vie priv\u00e9e existe-t-elle encore&nbsp;? Cet \u00e9pisode raconte l\u2019histoire d\u2019un candidat \u00ab&nbsp;\u00e9cart\u00e9&nbsp;\u00bb d\u2019une s\u00e9lection, \u00e0 cause d\u2019un post publi\u00e9 sur ses profils sociaux. Un avertissement pour les jeunes, mais aussi pour les moins jeunes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/12-1-scaled.webp\u00a0\u00bb alt=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.12&Prime; title_text=\u00a0\u00bbChannel \u00e9pisode&amp;nbsp;2.12&Prime; _builder_version=\u00a0\u00bb4.23.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00a0\u00bb4.23.2&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik||||||||\u00a0\u00bb text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">DES VACANCES TR\u00c8S \u00ab&nbsp;CH\u00c8RES&nbsp;\u00bb\/APPAREILS PARTAG\u00c9S<\/span><br \/>L\u2019essentiel de cette histoire est l\u2019importance de nos appareils dans la sph\u00e8re priv\u00e9e comme dans la sph\u00e8re professionnelle. C\u2019est pourquoi nous devons \u00eatre tr\u00e8s attentifs \u00e0 la fa\u00e7on dont nous utilisons ces outils.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_enable_image=\u00a0\u00bboff\u00a0\u00bb background_position=\u00a0\u00bbbottom_center\u00a0\u00bb custom_padding=\u00a0\u00bb50px||50px||true|false\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00a0\u00bb alt=\u00a0\u00bbPlus&#8230;\u00a0\u00bb title_text=\u00a0\u00bbPlus&#8230;\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-200px\u00a0\u00bb horizontal_offset=\u00a0\u00bb85px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-90px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-55px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-50px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_a_tablet=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_phone=\u00a0\u00bbtop_left\u00a0\u00bb position_origin_a_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_f_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_f_phone=\u00a0\u00bb\u00a0\u00bb position_origin_f_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb position_origin_r_tablet=\u00a0\u00bb\u00a0\u00bb position_origin_r_phone=\u00a0\u00bb\u00a0\u00bb position_origin_r_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb100%\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb positioning_tablet=\u00a0\u00bbabsolute\u00a0\u00bb positioning_phone=\u00a0\u00bbabsolute\u00a0\u00bb positioning_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb admin_label=\u00a0\u00bbLigne\u00a0\u00bb _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb||0px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb70px|170px|0px|170px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb|100px||100px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb70px|20px|0px|20px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|10px|10px||\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb0px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb text_font=\u00a0\u00bbRubik|300|||||||\u00a0\u00bb text_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; text_font_size=\u00a0\u00bb20px\u00a0\u00bb header_2_font=\u00a0\u00bbInter|700|||||||\u00a0\u00bb header_2_text_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; header_2_font_size=\u00a0\u00bb48px\u00a0\u00bb header_2_line_height=\u00a0\u00bb58px\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb||25px||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb||0px||false|false\u00a0\u00bb header_2_font_size_tablet=\u00a0\u00bb48px\u00a0\u00bb header_2_font_size_phone=\u00a0\u00bb32px\u00a0\u00bb header_2_font_size_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb header_2_line_height_tablet=\u00a0\u00bb58px\u00a0\u00bb header_2_line_height_phone=\u00a0\u00bb35px\u00a0\u00bb header_2_line_height_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00a0\u00bb]<\/p>\n<h2 style=\"text-align: center;\">Vous souhaitez en savoir plus&nbsp;?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; use_custom_gutter=\u00a0\u00bbon\u00a0\u00bb gutter_width=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb background_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb custom_margin=\u00a0\u00bb0px||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb0px|160px|70px|160px|false|true\u00a0\u00bb custom_padding_phone=\u00a0\u00bb0px|0px|70px|0px|false|true\u00a0\u00bb border_radii=\u00a0\u00bboff|||15px|15px\u00a0\u00bb box_shadow_style=\u00a0\u00bbpreset2&Prime; box_shadow_horizontal=\u00a0\u00bb1px\u00a0\u00bb box_shadow_vertical=\u00a0\u00bb20px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbCONTACTEZ-NOUS\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.23.2&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb global_module=\u00a0\u00bb105&Prime; saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMyODk1In19@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbFICHE DE DONN\u00c9ES\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.23.2&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#f18a00&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00a0\u00bb global_module=\u00a0\u00bb105&Prime; saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_button button_url=\u00a0\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbDEMANDEZ UNE D\u00c9MO\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_tablet=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_phone=\u00a0\u00bbcenter\u00a0\u00bb button_alignment_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.23.2&Prime; _dynamic_attributes=\u00a0\u00bbbutton_url\u00a0\u00bb _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb14px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&Prime; button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb3px\u00a0\u00bb button_font=\u00a0\u00bbRubik|||on|||||\u00a0\u00bb button_use_icon=\u00a0\u00bboff\u00a0\u00bb custom_margin=\u00a0\u00bb10px||10px||true|false\u00a0\u00bb custom_padding=\u00a0\u00bb12px||12px||true|true\u00a0\u00bb custom_css_main_element=\u00a0\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00a0\u00bb global_module=\u00a0\u00bb105&Prime; saved_tabs=\u00a0\u00bball\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb max_width=\u00a0\u00bb1440px\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.18.0&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00a0\u00bb alt=\u00a0\u00bbVous souhaitez en savoir plus\u00a0\u00bb title_text=\u00a0\u00bbVous souhaitez en savoir plus\u00a0\u00bb align=\u00a0\u00bbright\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb positioning=\u00a0\u00bbabsolute\u00a0\u00bb position_origin_a=\u00a0\u00bbbottom_right\u00a0\u00bb vertical_offset=\u00a0\u00bb-20px\u00a0\u00bb horizontal_offset=\u00a0\u00bb-100px\u00a0\u00bb vertical_offset_tablet=\u00a0\u00bb-20px\u00a0\u00bb vertical_offset_phone=\u00a0\u00bb-80px\u00a0\u00bb vertical_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb horizontal_offset_tablet=\u00a0\u00bb-100px\u00a0\u00bb horizontal_offset_phone=\u00a0\u00bb-130px\u00a0\u00bb horizontal_offset_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb width=\u00a0\u00bb25%\u00a0\u00bb width_tablet=\u00a0\u00bb25%\u00a0\u00bb width_phone=\u00a0\u00bb25%\u00a0\u00bb width_last_edited=\u00a0\u00bbon|phone\u00a0\u00bb custom_margin=\u00a0\u00bb||||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deuxi\u00e8me saison Nouvelles de derni\u00e8re heure sur la cybers\u00e9curit\u00e9Channel Training\/\u00c9pisodes saison&nbsp;2TOUS FOUS DE R\u00c9DUCTIONS\/WATERING HOLE (POINT D\u2019EAU) Dans cet \u00e9pisode, nous analysons encore une fois ce qu\u2019est une technique de cyberattaque emprunt\u00e9e \u00e0 la nature&nbsp;: la technique du point d\u2019eau (watering hole). L\u2019attaquant, comme un crocodile, se met en attente de sa victime.UNE P\u00caCHE FRUCTUEUSE\/ARNAQUE [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-34546","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Deuxi\u00e8me saison Channel - Cyber Guru<\/title>\n<meta name=\"description\" content=\"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deuxi\u00e8me saison Channel\" \/>\n<meta property=\"og:description\" content=\"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T16:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/deuxieme-saison-channel\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/deuxieme-saison-channel\\\/\",\"name\":\"Deuxi\u00e8me saison Channel - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"datePublished\":\"2023-12-19T18:07:02+00:00\",\"dateModified\":\"2024-01-04T16:44:01+00:00\",\"description\":\"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/deuxieme-saison-channel\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/deuxieme-saison-channel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/deuxieme-saison-channel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deuxi\u00e8me saison Channel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Deuxi\u00e8me saison Channel - Cyber Guru","description":"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/","og_locale":"fr_FR","og_type":"article","og_title":"Deuxi\u00e8me saison Channel","og_description":"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru","og_url":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-01-04T16:44:01+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/","url":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/","name":"Deuxi\u00e8me saison Channel - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"datePublished":"2023-12-19T18:07:02+00:00","dateModified":"2024-01-04T16:44:01+00:00","description":"12 \u00e9pisodes captivants dans la deuxi\u00e8me saison de Cyber Guru Channel, le programme de formation inductive de Cyber Guru","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/deuxieme-saison-channel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Deuxi\u00e8me saison Channel"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/34546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=34546"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/34546\/revisions"}],"predecessor-version":[{"id":34957,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/pages\/34546\/revisions\/34957"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=34546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}