{"id":31706,"date":"2023-06-13T10:41:21","date_gmt":"2023-06-13T10:41:21","guid":{"rendered":"https:\/\/www.cyberguru.it\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/"},"modified":"2023-06-14T10:19:51","modified_gmt":"2023-06-14T10:19:51","slug":"juice-jacking-le-piege-des-bornes-de-recharge-publiques","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/","title":{"rendered":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques"},"content":{"rendered":"\n<p>Nous connaissons tous la frustration d\u2019avoir un t\u00e9l\u00e9phone portable d\u00e9charg\u00e9 et donc inutilisable, et de ne pas avoir notre c\u00e2ble d\u2019alimentation avec nous. Alors, quoi de plus naturel que de le recharger l\u00e0 o\u00f9 c\u2019est possible, en utilisant peut-\u00eatre l\u2019une des bornes de recharge confortables mises \u00e0 disposition dans les lieux publics\u00a0?<\/p>\n\n<p>Et bien, <strong>cette op\u00e9ration, en apparence banale, comporte au contraire beaucoup de risques et devrait \u00eatre \u00e9vit\u00e9e<\/strong> en r\u00e9sistant \u00e0 l\u2019envie d\u2019avoir co\u00fbte que co\u00fbte un t\u00e9l\u00e9phone \u00e0 nouveau op\u00e9rationnel.<\/p>\n\n<p>La recommandation vient m\u00eame du <a href=\"https:\/\/www.fbi.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">FBI<\/a> qui lance une alerte sur un risque d\u2019attaque appel\u00e9e <strong>\u00ab\u00a0juice jacking\u00a0\u00bb<\/strong>, gr\u00e2ce \u00e0 laquelle les escrocs peuvent utiliser les ports USB publics pour voler des donn\u00e9es et introduire des programmes malveillants et des logiciels capables de faire planter les syst\u00e8mes de s\u00e9curit\u00e9 des appareils.<\/p>\n\n<p><strong>La <a href=\"https:\/\/www.fcc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">Federal Communication Commission (FCC)<\/a><\/strong> a \u00e9galement mis en garde les utilisateurs sur un autre aspect\u00a0: <strong>les cybercriminels pourraient m\u00eame laisser connect\u00e9s \u00e0 la colonne de charge des c\u00e2bles modifi\u00e9s<\/strong>, \u00e0 utiliser pour diffuser des programmes malveillants directement dans les appareils.<\/p>\n\n<h2 class=\"wp-block-heading\"><br\/>Qu\u2019est-ce que le Juice Jacking\u00a0?<br\/><\/h2>\n\n<p>La d\u00e9finition de <strong>\u00ab\u00a0juice jacking\u00a0\u00bb<\/strong> a \u00e9t\u00e9 fournie par Brian Krebs en\u00a02011 et se r\u00e9f\u00e8re \u00e0 la tentative d\u2019acc\u00e9der aux donn\u00e9es des smartphones en utilisant comme canal de communication le <strong>c\u00e2ble (jack)<\/strong> <strong>d\u2019alimentation (juice) USB<\/strong>. Avec ce dernier, il est en effet possible de recharger le t\u00e9l\u00e9phone en le connectant, par exemple, \u00e0 un port USB de l\u2019ordinateur ou \u00e0 une prise USB de recharge comme celles pr\u00e9sentes dans les h\u00f4tels ou dans de nombreux lieux publics.<br\/>Mais le m\u00eame <strong>c\u00e2ble est \u00e9galement utilis\u00e9 pour la transmission de donn\u00e9es<\/strong> et pour synchroniser le contenu entre le smartphone et l\u2019ordinateur. Et c\u2019est l\u00e0 que r\u00e9side le probl\u00e8me car <strong>en branchant votre smartphone sur une prise USB publique,<\/strong> vous risquez inconsciemment de le connecter \u00e0 un autre ordinateur et donc, de l\u2019exposer \u00e0 une attaque. Aujourd\u2019hui, ce type de fraude s\u2019est r\u00e9pandu pr\u00e9cis\u00e9ment en raison de l\u2019augmentation des points de recharge gratuits et de la pratique du <em>t\u00e9l\u00e9travail<\/em>, en particulier lorsqu\u2019il y a des postes partag\u00e9s par plusieurs utilisateurs.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Comment \u00e7a marche\u00a0?<\/strong><\/h2>\n\n<p>La violation passe g\u00e9n\u00e9ralement par l\u2019installation d\u2019un logiciel (un programme malveillant pr\u00e9cis\u00e9ment) ou par la simple copie secr\u00e8te des donn\u00e9es contenues dans un t\u00e9l\u00e9phone, une tablette ou un ordinateur portable. <strong>Selon les experts, les appareils Android seraient plus expos\u00e9s que ceux fabriqu\u00e9s par Apple, mais aucun appareil ne peut \u00eatre consid\u00e9r\u00e9 comme totalement s\u00fbr par rapport \u00e0 cette pratique<\/strong>. Le probl\u00e8me est que m\u00eame en d\u00e9branchant ce c\u00e2ble de notre appareil, le risque reste pr\u00e9sent. Le suivi des donn\u00e9es peut \u00e9galement avoir lieu apr\u00e8s l\u2019attaque, ce qui permet aux pirates de continuer \u00e0 voler des donn\u00e9es, des informations, des photos et des vid\u00e9os. Les risques de ce ph\u00e9nom\u00e8ne comprennent \u00e9galement l\u2019utilisation de \u00ab\u00a0<strong>cryptominer<\/strong>\u00a0\u00bb, processus cach\u00e9s dans une application, un site internet ou un lien pouvant utiliser les ressources de l\u2019ordinateur infect\u00e9 pour g\u00e9n\u00e9rer de la crypto-monnaie pour le compte de pirates informatiques \u00e0 l\u2019insu du propri\u00e9taire\u00a0; ou bien de <strong>spyware ou cheval de Troie<\/strong>, capables d\u2019endommager votre appareil, ou des ran\u00e7ongiciels qui saisissent num\u00e9riquement les donn\u00e9es par cryptage, pour ensuite demander une ran\u00e7on, g\u00e9n\u00e9ralement de type \u00e9conomique.<\/p>\n\n<p><strong>En bref, une op\u00e9ration qui peut sembler anodine comme recharger un t\u00e9l\u00e9phone portable peut avoir des cons\u00e9quences tr\u00e8s graves.<\/strong><\/p>\n\n<h2 class=\"wp-block-heading\">Comment bien se prot\u00e9ger\u00a0?<\/h2>\n\n<p><strong>Le FBI recommande de toujours emporter avec soi le chargeur ou une <em>powerbank <\/em>(batterie de secours).<\/strong> <br\/>De plus, si vous ne pouvez pas vous passer d\u2019un port USB public, il est conseill\u00e9 d\u2019utiliser un c\u00e2ble d\u2019alimentation\/recharge uniquement, c\u2019est-\u00e0-dire sans les \u00ab\u00a0fils\u00a0\u00bb utilis\u00e9s pour la transmission de donn\u00e9es. Dans tous les cas, il est toujours important d\u2019\u00e9teindre le t\u00e9l\u00e9phone avant de le charger.<br\/><a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/safety-resources\/scams-and-safety\/on-the-internet\" target=\"_blank\" rel=\"noreferrer noopener\">Le site du FBI <\/a>fournit \u00e9galement plusieurs autres conseils standard tels que changer r\u00e9guli\u00e8rement les mots de passe et se doter d\u2019antivirus efficaces. En plus de cela, nous vous recommandons de <strong>ne pas effectuer de transactions sensibles telles que des transactions d\u2019argent, des achats en ligne par carte bancaire ou des connexions \u00e0 des sites sensibles <\/strong>tels que ceux de votre banque ou li\u00e9s \u00e0 votre profession, lorsque vous \u00eates connect\u00e9 \u00e0 un r\u00e9seau public.<br\/>Ces recommandations sont tr\u00e8s utiles, mais en amont, il devrait y avoir tout de m\u00eame une pr\u00e9paration solide et continue sur les risques informatiques. La meilleure d\u00e9fense contre les attaques qui peuvent se trouver aujourd\u2019hui dans tous les coins de notre quotidien n\u2019est pas une liste de r\u00e8gles \u00e0 apprendre et \u00e0 m\u00e9moriser, mais consiste \u00e0 adopter une v\u00e9ritable posture num\u00e9rique qui nous rend fermes et inattaquables et que l\u2019on ne peut d\u00e9velopper qu\u2019en suivant un parcours de formation substantiel, continu et de qualit\u00e9.<\/p>\n\n<p><\/p>\n\n<p><\/p>\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"31681\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/chargekiosk_sheep.jpg\" alt=\"vous ne devez pas confier votre smartphone aux kiosques publics\" class=\"wp-image-31681\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/chargekiosk_sheep.jpg 1024w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/chargekiosk_sheep-980x735.jpg 980w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/chargekiosk_sheep-480x360.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"31677\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1182-1024x768.jpg\" alt=\"&#xE0; l&#x2019;ext&#xE9;rieur du kiosque de recharge usb\" class=\"wp-image-31677\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1182-980x735.jpg 980w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1182-480x360.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"31685\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1176-1024x768.jpg\" alt=\"&#xE0; l&#x2019;int&#xE9;rieur du kiosque de recharge usb\" class=\"wp-image-31685\" srcset=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1176-980x735.jpg 980w, https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/CIMG1176-480x360.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure><\/figure>\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nous connaissons tous la frustration d\u2019avoir un t\u00e9l\u00e9phone portable d\u00e9charg\u00e9 et donc inutilisable, et de ne pas avoir notre c\u00e2ble d\u2019alimentation avec nous. Alors, quoi de plus naturel que de le recharger l\u00e0 o\u00f9 c\u2019est possible, en utilisant peut-\u00eatre l\u2019une des bornes de recharge confortables mises \u00e0 disposition dans les lieux publics\u00a0? Et bien, cette [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":31694,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[],"tags":[54,651,721,720,607],"class_list":["post-31706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cyber-security-awareness","tag-cybersecurite-fr","tag-juice-jacking-fr","tag-programme-malveillant","tag-sensibilisation-a-la-cybersecurite-fr-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques<\/title>\n<meta name=\"description\" content=\"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques\" \/>\n<meta property=\"og:description\" content=\"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T10:41:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-14T10:19:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques\",\"datePublished\":\"2023-06-13T10:41:21+00:00\",\"dateModified\":\"2023-06-14T10:19:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/\"},\"wordCount\":899,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/juice-jacking.jpg\",\"keywords\":[\"Cyber Security Awareness\",\"Cybers\u00e9curit\u00e9\",\"Juice Jacking\",\"Programme malveillant\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/\",\"name\":\"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/juice-jacking.jpg\",\"datePublished\":\"2023-06-13T10:41:21+00:00\",\"dateModified\":\"2023-06-14T10:19:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/juice-jacking.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/juice-jacking.jpg\",\"width\":1200,\"height\":801,\"caption\":\"Juice Jacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2023\\\/06\\\/13\\\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques","description":"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/","og_locale":"fr_FR","og_type":"article","og_title":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques","og_description":"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.","og_url":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2023-06-13T10:41:21+00:00","article_modified_time":"2023-06-14T10:19:51+00:00","og_image":[{"width":1200,"height":801,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg","type":"image\/jpeg"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"simona derubis","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques","datePublished":"2023-06-13T10:41:21+00:00","dateModified":"2023-06-14T10:19:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/"},"wordCount":899,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg","keywords":["Cyber Security Awareness","Cybers\u00e9curit\u00e9","Juice Jacking","Programme malveillant","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/","url":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/","name":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg","datePublished":"2023-06-13T10:41:21+00:00","dateModified":"2023-06-14T10:19:51+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"Attention au juice jacking, un type de cyberattaque utilisant un port de charge qui sert \u00e9galement de port de transfert de donn\u00e9es, g\u00e9n\u00e9ralement un port USB.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/06\/juice-jacking.jpg","width":1200,"height":801,"caption":"Juice Jacking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2023\/06\/13\/juice-jacking-le-piege-des-bornes-de-recharge-publiques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Juice Jacking&nbsp;: le pi\u00e8ge des bornes de recharge publiques"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/31706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=31706"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/31706\/revisions"}],"predecessor-version":[{"id":31707,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/31706\/revisions\/31707"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/31694"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=31706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=31706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=31706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}