{"id":41970,"date":"2024-12-23T14:18:59","date_gmt":"2024-12-23T14:18:59","guid":{"rendered":"https:\/\/www.cyberguru.it\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/"},"modified":"2025-01-03T11:23:32","modified_gmt":"2025-01-03T11:23:32","slug":"ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/","title":{"rendered":"Ghost Tap : l&rsquo;attaque fant\u00f4me qui utilise notre \u00e9cran tactile"},"content":{"rendered":"\n<p>Imaginez que votre smartphone soit dans votre poche, en veilleuse, alors que vous \u00eates tranquillement en train de siroter un caf\u00e9. Tout semble normal, mais \u00e0 ce moment-l\u00e0, quelqu&rsquo;un pourrait l&rsquo;utiliser \u00e0 votre place, sans que vous vous en rendiez compte.   <\/p>\n\n<p><strong>Cela ressemble \u00e0 de la science-fiction ?  <\/strong><\/p>\n\n<p>Ce n&rsquo;est pas le cas.  <\/p>\n\n<p>Il s&rsquo;agit de <strong>Ghost Tap<\/strong>, l&rsquo;une des attaques les plus insidieuses de la cybers\u00e9curit\u00e9 moderne.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-cos-e-il-ghost-tap\"><strong>Qu&rsquo;est-ce que Ghost Tap ?<\/strong><\/h3>\n\n<p>Le Ghost Tap est une attaque qui exploite les vuln\u00e9rabilit\u00e9s des appareils \u00e0 \u00e9cran tactile, en simulant des touches que l&rsquo;utilisateur n&rsquo;a jamais r\u00e9ellement effectu\u00e9es. C&rsquo;<strong>est comme si un fant\u00f4me prenait le contr\u00f4le de votre smartphone<\/strong>, autorisant des transactions, ouvrant des liens ou modifiant des param\u00e8tres, sans que vous en ayez la moindre id\u00e9e.<\/p>\n\n<p>Il ne s&rsquo;agit pas d&rsquo;un film d&rsquo;horreur, mais d&rsquo;une r\u00e9alit\u00e9 technique qui peut \u00eatre exploit\u00e9e par des cybercriminels \u00e0 des fins peu nobles : voler des donn\u00e9es, vider des comptes bancaires ou, pire encore, faire de votre appareil un complice involontaire d&rsquo;activit\u00e9s illicites.<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-come-funziona\"><strong>Comment cela fonctionne-t-il ?<\/strong><\/h3>\n\n<p>Le Ghost Tap exploite deux \u00e9l\u00e9ments :<\/p>\n\n<ol class=\"wp-block-list\">\n<li><br\/>L<strong>a vuln\u00e9rabilit\u00e9 des \u00e9crans tactiles<\/strong>: les \u00e9crans tactiles fonctionnent en d\u00e9tectant des changements dans les champs \u00e9lectriques lorsque nous touchons l&rsquo;\u00e9cran. Les cybercriminels, \u00e0 l&rsquo;aide d&rsquo;outils sophistiqu\u00e9s, peuvent injecter de faux signaux qui simulent ces contacts. En pratique, l&rsquo;appareil \u00ab\u00a0pense\u00a0\u00bb que vous agissez, mais c&rsquo;est le criminel qui le commande.  <\/li>\n\n\n\n<li><br\/>C<strong>ontr\u00f4le \u00e0 distance<\/strong>: une fois l&rsquo;appareil compromis, le criminel peut envoyer des commandes \u00e0 distance, \u00e9ventuellement \u00e0 l&rsquo;aide de logiciels malveillants ou de techniques avanc\u00e9es telles que la technique du<em><a href=\"https:\/\/www.cyberguru.it\/2023\/11\/17\/quando-giulio-cesare-inviava-messaggi-sicuri-la-storia-millenaria-della-crittografia\/\" target=\"_blank\" rel=\"noreferrer noopener\">homme du milieu<\/a><\/em> pour manipuler ce qui se passe sur votre \u00e9cran.<\/li>\n<\/ol>\n\n<h3 class=\"wp-block-heading\" id=\"h-il-caso-nfcgate\"><strong>L&rsquo;affaire NFCGate<\/strong><\/h3>\n\n<p>Un exemple int\u00e9ressant est l&rsquo;utilisation d&rsquo;outils tels que <strong>NFCGate<\/strong>. <br\/>Ce logiciel, cr\u00e9\u00e9 dans le but l\u00e9gitime d&rsquo;analyser les communications NFC, a \u00e9t\u00e9 transform\u00e9 en arme cybern\u00e9tique. Les cybercriminels l&rsquo;utilisent non seulement pour transmettre des donn\u00e9es NFC vol\u00e9es, mais aussi pour op\u00e9rer de mani\u00e8re totalement secr\u00e8te. Pensez-y : un voleur pourrait simuler des op\u00e9rations \u00e0 des milliers de kilom\u00e8tres de distance, en se coordonnant avec des complices, ou m\u00eame exploiter des r\u00e9seaux de \u00ab\u00a0mules\u00a0\u00bb pour transf\u00e9rer des fonds illicites.  <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-perche-e-pericoloso\"><strong>Pourquoi est-ce dangereux ?<\/strong><\/h3>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Le Ghost Tap est dangereux parce qu&rsquo;il est invisible. Il <strong>n&rsquo;y a pas de fen\u00eatres pop-up, d&rsquo;erreurs ou de signaux \u00e9vidents<\/strong>: l&rsquo;appareil continue de fonctionner normalement, alors que sous la surface, la malice est en train de se d\u00e9rouler. <br\/><br\/><br\/><br\/><br\/> Une telle attaque peut : &#8211;<strong> autoriser des paiements et des transactions ; &#8211; voler des donn\u00e9es sensibles ; &#8211; modifier les param\u00e8tres de s\u00e9curit\u00e9, ce qui rend l&rsquo;appareil encore plus vuln\u00e9rable.<\/strong><\/p>\n<\/blockquote>\n\n<h3 class=\"wp-block-heading\" id=\"h-chi-e-a-rischio\"><strong>Qui est \u00e0 risque ?<\/strong><\/h3>\n\n<p><strong>La r\u00e9ponse courte ? Tous.   <\/strong><br\/>Bien que les appareils anciens soient plus vuln\u00e9rables, personne ne peut affirmer qu&rsquo;ils sont s\u00fbrs. Il suffit souvent d&rsquo;une distraction, comme l&rsquo;installation d&rsquo;une application provenant d&rsquo;une source non s\u00e9curis\u00e9e ou la connexion \u00e0 un chargeur compromis, pour ouvrir la porte aux cybercriminels. <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-come-proteggersi-dal-ghost-tap\"><strong>Comment se prot\u00e9ger du Ghost Tap ?<\/strong><\/h3>\n\n<p>La bonne nouvelle, c&rsquo;est que nous pouvons nous d\u00e9fendre.  <\/p>\n\n<p>Voici quelques r\u00e8gles d&rsquo;or :<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Mettez toujours vos appareils \u00e0 jour<\/strong>: Les mises \u00e0 jour ferment la porte aux cybercriminels.<\/li>\n\n\n\n<li><strong>V\u00e9rifiez les autorisations des applications<\/strong>: si une application de retouche photo vous demande de v\u00e9rifier votre \u00e9cran, demandez-vous pourquoi.<\/li>\n\n\n\n<li><strong>Ne t\u00e9l\u00e9chargez qu&rsquo;\u00e0 partir de sources officielles<\/strong>: les magasins alternatifs pr\u00e9sentent un risque.<\/li>\n\n\n\n<li><strong>Utilisez des outils de s\u00e9curit\u00e9<\/strong>: les antivirus et les pare-feu peuvent bloquer les comportements suspects.<\/li>\n\n\n\n<li><strong>M\u00e9fiez-vous des accessoires inconnus<\/strong>: un chargeur qui n&rsquo;est pas d&rsquo;origine peut \u00eatre plus dangereux que vous ne le pensez.<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusioni\"><strong>Conclusions<\/strong><\/h3>\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The Ghost Tap est une attaque aussi sophistiqu\u00e9e qu&rsquo;inqui\u00e9tante. <br\/>Elle nous rappelle que nous vivons dans un monde o\u00f9 toute technologie peut \u00eatre une arme \u00e0 double tranchant. <strong>La cl\u00e9 pour se d\u00e9fendre est la prise de conscience<\/strong>: savoir que certains risques existent, comprendre comment ils fonctionnent et prendre des mesures simples mais efficaces pour se prot\u00e9ger.<\/p>\n<\/blockquote>\n\n<p>Et, si nous sommes honn\u00eates, c&rsquo;est aussi une invitation \u00e0 repenser notre relation avec les appareils num\u00e9riques. Ils ne sont pas de simples outils, mais de v\u00e9ritables gardiens de nos vies. C&rsquo;est \u00e0 nous de d\u00e9cider dans quelle mesure nous voulons les prot\u00e9ger.  <\/p>\n\n<p><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Imaginez que votre smartphone soit dans votre poche, en veilleuse, alors que vous \u00eates tranquillement en train de siroter un caf\u00e9. Tout semble normal, mais \u00e0 ce moment-l\u00e0, quelqu&rsquo;un pourrait l&rsquo;utiliser \u00e0 votre place, sans que vous vous en rendiez compte. Cela ressemble \u00e0 de la science-fiction ? Ce n&rsquo;est pas le cas. Il s&rsquo;agit [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":41958,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[116],"tags":[756,503,502],"class_list":["post-41970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-cyber-security-awareness-fr","tag-cybercrime-fr-2","tag-sensibilisation-a-la-cybersecurite-fr-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ghost Tap : l&#039;attaque fant\u00f4me qui utilise notre \u00e9cran tactile<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ghost Tap : l&#039;attaque fant\u00f4me qui utilise notre \u00e9cran tactile\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-23T14:18:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T11:23:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"688\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"simona derubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"simona derubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/\"},\"author\":{\"name\":\"simona derubis\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"headline\":\"Ghost Tap : l&rsquo;attaque fant\u00f4me qui utilise notre \u00e9cran tactile\",\"datePublished\":\"2024-12-23T14:18:59+00:00\",\"dateModified\":\"2025-01-03T11:23:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/\"},\"wordCount\":725,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Ghost-Tap.webp\",\"keywords\":[\"Cyber Security Awareness\",\"cybercrime\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/\",\"name\":\"Ghost Tap : l'attaque fant\u00f4me qui utilise notre \u00e9cran tactile\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Ghost-Tap.webp\",\"datePublished\":\"2024-12-23T14:18:59+00:00\",\"dateModified\":\"2025-01-03T11:23:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\"},\"description\":\"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Ghost-Tap.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Ghost-Tap.webp\",\"width\":1200,\"height\":688,\"caption\":\"Ghost-Tap\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2024\\\/12\\\/23\\\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ghost Tap : l&rsquo;attaque fant\u00f4me qui utilise notre \u00e9cran tactile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/9413e6685fb4a58629955d29c3a5c484\",\"name\":\"simona derubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g\",\"caption\":\"simona derubis\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/simona-derubis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ghost Tap : l'attaque fant\u00f4me qui utilise notre \u00e9cran tactile","description":"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/","og_locale":"fr_FR","og_type":"article","og_title":"Ghost Tap : l'attaque fant\u00f4me qui utilise notre \u00e9cran tactile","og_description":"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.","og_url":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-12-23T14:18:59+00:00","article_modified_time":"2025-01-03T11:23:32+00:00","og_image":[{"width":1200,"height":688,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp","type":"image\/webp"}],"author":"simona derubis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"simona derubis","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/"},"author":{"name":"simona derubis","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"headline":"Ghost Tap : l&rsquo;attaque fant\u00f4me qui utilise notre \u00e9cran tactile","datePublished":"2024-12-23T14:18:59+00:00","dateModified":"2025-01-03T11:23:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/"},"wordCount":725,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp","keywords":["Cyber Security Awareness","cybercrime","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Security Awareness"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/","url":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/","name":"Ghost Tap : l'attaque fant\u00f4me qui utilise notre \u00e9cran tactile","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp","datePublished":"2024-12-23T14:18:59+00:00","dateModified":"2025-01-03T11:23:32+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484"},"description":"D\u00e9couvrez la dangereuse attaque Ghost Tap en mati\u00e8re de cybers\u00e9curit\u00e9. Capable de prendre le contr\u00f4le de votre smartphone \u00e0 votre insu.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/12\/Ghost-Tap.webp","width":1200,"height":688,"caption":"Ghost-Tap"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2024\/12\/23\/ghost-tap-lattaque-fantome-qui-utilise-notre-ecran-tactile\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Ghost Tap : l&rsquo;attaque fant\u00f4me qui utilise notre \u00e9cran tactile"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/9413e6685fb4a58629955d29c3a5c484","name":"simona derubis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c0ee55b2203163ceef95af9890fba256e9cf8a9444749f1e216b4706aab4d9e?s=96&d=mm&r=g","caption":"simona derubis"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/simona-derubis\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/41970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=41970"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/41970\/revisions"}],"predecessor-version":[{"id":41971,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/41970\/revisions\/41971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/41958"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=41970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=41970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=41970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}