{"version":"1.0","provider_name":"Blog Avast Antivirus","provider_url":"https:\/\/www.antivirusedition.com\/blog","author_name":"La r\u00e9daction","author_url":"https:\/\/www.antivirusedition.com\/blog\/author\/admin","title":"Qu'est-ce qu'un Cheval de Troie ? - Blog Avast Antivirus","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0I7TjTMjPZ\"><a href=\"https:\/\/www.antivirusedition.com\/blog\/quest-ce-quun-cheval-de-troie-1302.html\">Qu&rsquo;est-ce qu&rsquo;un Cheval de Troie ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.antivirusedition.com\/blog\/quest-ce-quun-cheval-de-troie-1302.html\/embed#?secret=0I7TjTMjPZ\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Qu&rsquo;est-ce qu&rsquo;un Cheval de Troie ?\u00a0\u00bb &#8212; Blog Avast Antivirus\" data-secret=\"0I7TjTMjPZ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Les chevaux de Troie, ou Trojans en anglais, sont des menaces informatiques sophistiqu\u00e9es qui se cachent derri\u00e8re des apparences innocentes pour compromettre la s\u00e9curit\u00e9 des syst\u00e8mes informatiques. Ils repr\u00e9sentent une menace s\u00e9rieuse pour la s\u00e9curit\u00e9 des donn\u00e9es personnelles et professionnelles. Dans cet article, nous allons explorer en profondeur ce qu&rsquo;est un cheval de Troie, comment [&hellip;]","thumbnail_url":"https:\/\/www.antivirusedition.com\/blog\/wp-content\/uploads\/2025\/02\/Untitled-design-4-1024x1024.png"}