{"id":40030,"date":"2024-10-02T15:39:56","date_gmt":"2024-10-02T15:39:56","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=40030"},"modified":"2024-10-03T14:44:26","modified_gmt":"2024-10-03T14:44:26","slug":"cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/","title":{"rendered":"Cyber Carte #30 &#8211; Vishing : si vous le reconnaissez, vous l&rsquo;\u00e9vitez"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb0px||0px||false|false\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.2&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb min_height=\u00a0\u00bb1363.1px\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h2><span>Conna\u00eetre les m\u00e9thodes des cyber <\/span><span>criminels <\/span><span>pour voler des informations sensibles est la premi\u00e8re \u00e9tape de la pr\u00e9vention d&rsquo;une attaque !<\/span><\/h2>\n<p><span>L&rsquo;hame\u00e7onnage est un type d&rsquo;attaque d&rsquo;ing\u00e9nierie sociale similaire \u00e0 l&rsquo;hame\u00e7onnage.<\/span><\/p>\n<p><span>La diff\u00e9rence avec les autres types d&rsquo;hame\u00e7onnage est qu&rsquo;au lieu d&rsquo;envoyer des courriels ou des messages textuels, l&rsquo;attaque est men\u00e9e par le biais d&rsquo;un appel t\u00e9l\u00e9phonique, c&rsquo;est pourquoi on parle aussi d&rsquo;hame\u00e7onnage vocal. <\/span><\/p>\n<p><span>G\u00e9n\u00e9ralement, le vishing utilise un message vocal automatis\u00e9 transmis par une entit\u00e9 simulant une institution l\u00e9gitime, telle qu&rsquo;une banque, une agence gouvernementale ou une autre entreprise fournissant des services l\u00e9gitimes. <\/span><\/p>\n<p><span>Les m\u00e9canismes visant \u00e0 inciter les victimes \u00e0 faire confiance et \u00e0 agir dans l&rsquo;int\u00e9r\u00eat de l&rsquo;attaquant sont toujours les m\u00eames : les attaquants informent la victime de dettes d&rsquo;argent, de polices d&rsquo;assurance arrivant \u00e0 \u00e9ch\u00e9ance, de comptes sur le point d&rsquo;\u00eatre bloqu\u00e9s ou d&rsquo;une carte de cr\u00e9dit sur laquelle une activit\u00e9 suspecte a \u00e9t\u00e9 d\u00e9tect\u00e9e et doit \u00eatre r\u00e9solue imm\u00e9diatement. <\/span><\/p>\n<p><span>Exploitant les craintes et les inqui\u00e9tudes de nombreuses personnes, le criminel nous contacte pr\u00e9cis\u00e9ment pour nous aider \u00e0 r\u00e9soudre le probl\u00e8me. La victime finira m\u00eame par \u00eatre heureuse de coop\u00e9rer, en fournissant toutes les informations qu&rsquo;il lui demande, y compris des informations personnelles et sensibles. <\/span><\/p>\n<p><span>Voici <\/span><span>quelques r\u00e8gles simples pour \u00e9viter de tomber dans le pi\u00e8ge !<\/span><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_FR.webp\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_FR.webp\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><em><strong>Cette cybercarte peut vous aider \u00e0 acqu\u00e9rir la bonne conscience num\u00e9rique !<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:image -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conna\u00eetre les m\u00e9thodes des cyber criminels pour voler des informations sensibles est la premi\u00e8re \u00e9tape de la pr\u00e9vention d&rsquo;une attaque ! L&rsquo;hame\u00e7onnage est un type d&rsquo;attaque d&rsquo;ing\u00e9nierie sociale similaire \u00e0 l&rsquo;hame\u00e7onnage. La diff\u00e9rence avec les autres types d&rsquo;hame\u00e7onnage est qu&rsquo;au lieu d&rsquo;envoyer des courriels ou des messages textuels, l&rsquo;attaque est men\u00e9e par le biais d&rsquo;un [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":40212,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[606,511,746],"class_list":["post-40030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-hameconnage-fr-2","tag-smishing-fr-2","tag-vishing-fr-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l&#039;\u00e9vitez<\/title>\n<meta name=\"description\" content=\"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d&#039;attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l&#039;\u00e9vitez\" \/>\n<meta property=\"og:description\" content=\"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d&#039;attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T15:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T14:44:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Carte #30 &#8211; Vishing : si vous le reconnaissez, vous l&rsquo;\u00e9vitez\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:44:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/\"},\"wordCount\":377,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_FR.webp\",\"keywords\":[\"Hame\u00e7onnage\",\"Smishing\",\"vishing\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/\",\"name\":\"Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l'\u00e9vitez\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_FR.webp\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:44:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d'attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_FR.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_FR.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/10\\\/02\\\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Carte #30 &#8211; Vishing : si vous le reconnaissez, vous l&rsquo;\u00e9vitez\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l'\u00e9vitez","description":"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d'attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l'\u00e9vitez","og_description":"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d'attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.","og_url":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-10-02T15:39:56+00:00","article_modified_time":"2024-10-03T14:44:26+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Carte #30 &#8211; Vishing : si vous le reconnaissez, vous l&rsquo;\u00e9vitez","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:44:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/"},"wordCount":377,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp","keywords":["Hame\u00e7onnage","Smishing","vishing"],"articleSection":["Carte"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/","url":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/","name":"Cyber Carte #30 - Vishing : si vous le reconnaissez, vous l'\u00e9vitez","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:44:26+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Apprenez \u00e0 reconna\u00eetre et \u00e0 \u00e9viter le Vishing, une m\u00e9thode d'attaque utilis\u00e9e par les cybercriminels pour voler vos informations sensibles.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_FR.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/10\/02\/cyber-carte-30-vishing-si-vous-le-reconnaissez-vous-levitez\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Cyber Carte #30 &#8211; Vishing : si vous le reconnaissez, vous l&rsquo;\u00e9vitez"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/40030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=40030"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/40030\/revisions"}],"predecessor-version":[{"id":40218,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/40030\/revisions\/40218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/40212"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=40030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=40030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=40030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}