{"id":26267,"date":"2019-09-10T15:11:11","date_gmt":"2019-09-10T15:11:11","guid":{"rendered":"http:\/\/35.157.126.229\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/"},"modified":"2023-03-06T16:39:13","modified_gmt":"2023-03-06T16:39:13","slug":"carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/","title":{"rendered":"Carte virtuelle #04 &#8211; Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb30px|30px|30px|30px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbligne\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbText\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]La carte virtuelle #4 indique quelques astuces simples \u00e0 suivre pour ne pas \u00eatre victime des cybercriminels, en particulier <strong>pour \u00e9viter que les logiciels malveillants, sous leurs multiples formes, ne s\u2019installent dans nos ordinateurs<\/strong>.<\/p>\n<p>Pourquoi est-ce si important\u00a0? Parce que tr\u00e8s souvent, le point de d\u00e9part d\u2019une strat\u00e9gie de cyberattaque se fait pr\u00e9cis\u00e9ment par l\u2019utilisation de logiciels malveillants. Les logiciels malveillants peuvent voler des donn\u00e9es sensibles de votre ordinateur, le ralentir progressivement ou utiliser des comptes de messagerie, \u00e0 votre insu, pour envoyer des pourriels.<\/p>\n<p>Mais pour s\u2019installer sur nos ordinateurs, ils ont besoin de la <strong>collaboration \u00ab\u00a0inconsciente\u00a0\u00bb de la victime<\/strong>.<\/p>\n<p>Certaines mesures peuvent donc nous aider \u00e0 pr\u00e9venir des situations d\u00e9licates\u00a0:<\/p>\n<ol>\n<li><strong>Ne pas ouvrir de pi\u00e8ces jointes ou de liens pr\u00e9sents dans les courriels<\/strong> avec un\u00a0exp\u00e9diteur inconnu\u00a0ou m\u00eame avec un objet ou un texte suspect<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>Ne pas cliquer \u00ab\u00a0aveugl\u00e9ment\u00a0\u00bb sur la\u00a0publicit\u00e9<\/strong>, les banni\u00e8res et les fen\u00eatres pop-up sur internet qui promettent des remises sp\u00e9ciales<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>Ne pas entrer de donn\u00e9es sensibles<\/strong>\u00a0telles que les donn\u00e9es de connexion, de compte bancaire\u00a0ou les mots de passe, en cas de doute sur la l\u00e9gitimit\u00e9 de la demande.<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\">T\u00e9l\u00e9charger <strong>des APPLICATIONS et des fichiers uniquement \u00e0 partir de\u00a0sources fiables<\/strong> et \u00e9viter de t\u00e9l\u00e9charger des\u00a0APPLICATIONS ou des programmes ind\u00e9sirables.<\/p>\n<\/li>\n<\/ol>\n<p>Continuez \u00e0 suivre nos cartes virtuelles, pour conna\u00eetre quelques astuces simples et utiles pour vous d\u00e9fendre contre les cybercriminels\u00a0!<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/4FR-724x1024.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/4FR-724x1024.png\" alt=\"4 (2)\" class=\"wp-image-18994\" width=\"816\" height=\"1154\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La carte virtuelle #4 indique quelques astuces simples \u00e0 suivre pour ne pas \u00eatre victime des cybercriminels, en particulier pour \u00e9viter que les logiciels malveillants, sous leurs multiples formes, ne s\u2019installent dans nos ordinateurs. Pourquoi est-ce si important\u00a0? Parce que tr\u00e8s souvent, le point de d\u00e9part d\u2019une strat\u00e9gie de cyberattaque se fait pr\u00e9cis\u00e9ment par l\u2019utilisation [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25092,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[608,609,756,606,604,607],"class_list":["post-26267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-arnaques-fr","tag-carte-virtuelle","tag-cyber-security-awareness-fr","tag-hameconnage-fr-2","tag-sensibilisation-a-la-cybersecurite-fr-4","tag-sensibilisation-a-la-cybersecurite-fr-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb -<\/title>\n<meta name=\"description\" content=\"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb\" \/>\n<meta property=\"og:description\" content=\"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T15:11:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T16:39:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Carte virtuelle #04 &#8211; Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2023-03-06T16:39:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/\"},\"wordCount\":380,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04FR.png\",\"keywords\":[\"Arnaques\",\"carte virtuelle\",\"Cyber Security Awareness\",\"Hame\u00e7onnage\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/\",\"name\":\"Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04FR.png\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2023-03-06T16:39:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04FR.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04FR.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2019\\\/09\\\/10\\\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Carte virtuelle #04 &#8211; Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb -","description":"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/","og_locale":"fr_FR","og_type":"article","og_title":"Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb","og_description":"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?","og_url":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2019-09-10T15:11:11+00:00","article_modified_time":"2023-03-06T16:39:13+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Carte virtuelle #04 &#8211; Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2023-03-06T16:39:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/"},"wordCount":380,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png","keywords":["Arnaques","carte virtuelle","Cyber Security Awareness","Hame\u00e7onnage","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Carte"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/","url":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/","name":"Carte virtuelle #04 - Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb -","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2023-03-06T16:39:13+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Cette carte virtuelle est d\u00e9di\u00e9e aux logiciels malveillants, souvent utilis\u00e9s comme point de d\u00e9part d\u2019une cyberattaque. Que peut-on faire pour les \u00e9viter\u00a0?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04FR.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2019\/09\/10\/carte-virtuelle-04-comment-eviter-les-logiciels-malveillants-et-leurs-mauvaises-intentions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Carte virtuelle #04 &#8211; Comment \u00e9viter les logiciels malveillants et leurs \u00ab&nbsp;mauvaises intentions&nbsp;\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=26267"}],"version-history":[{"count":15,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26267\/revisions"}],"predecessor-version":[{"id":28564,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26267\/revisions\/28564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/25092"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=26267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=26267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=26267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}