{"version":"1.0","provider_name":"Blog Avast Antivirus","provider_url":"https:\/\/www.antivirusedition.com\/blog","author_name":"La r\u00e9daction","author_url":"https:\/\/www.antivirusedition.com\/blog\/author\/admin","title":"Qu'est ce qu'une attaque de phishing ? - Blog Avast Antivirus","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"PA9ZodPwjV\"><a href=\"https:\/\/www.antivirusedition.com\/blog\/quest-ce-quune-attaque-de-phishing-1247.html\">Qu&rsquo;est ce qu&rsquo;une attaque de phishing ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.antivirusedition.com\/blog\/quest-ce-quune-attaque-de-phishing-1247.html\/embed#?secret=PA9ZodPwjV\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Qu&rsquo;est ce qu&rsquo;une attaque de phishing ?\u00a0\u00bb &#8212; Blog Avast Antivirus\" data-secret=\"PA9ZodPwjV\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Dans le monde num\u00e9rique d&rsquo;aujourd&rsquo;hui, les attaques de phishing repr\u00e9sentent une menace s\u00e9rieuse pour la s\u00e9curit\u00e9 des donn\u00e9es personnelles et professionnelles. Ces attaques exploitent la cr\u00e9dulit\u00e9 et la confiance des utilisateurs pour voler des informations sensibles telles que des identifiants de connexion, des informations financi\u00e8res et d&rsquo;autres donn\u00e9es personnelles. Dans cet article, nous explorerons en [&hellip;]"}