{"id":1240,"date":"2017-09-27T18:14:12","date_gmt":"2017-09-27T17:14:12","guid":{"rendered":"https:\/\/werle.pro\/?p=1240"},"modified":"2017-09-27T18:19:02","modified_gmt":"2017-09-27T17:19:02","slug":"les-cyberattaques-mobiles-ont-augmente-de-40","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2017\/09\/27\/les-cyberattaques-mobiles-ont-augmente-de-40\/","title":{"rendered":"Les cyberattaques mobiles ont augment\u00e9 de 40 %"},"content":{"rendered":"<div class=\"page-meta-wrapper\">\n<p>By <span class=\"author\"> <a title=\"Articles par Damien Bancal\" href=\"https:\/\/www.datasecuritybreach.fr\/author\/red-action\/\" rel=\"author\">Damien Bancal<\/a> <\/span> <span class=\"meta-sep\">|<\/span> on Sep 24, 2017 <span class=\"meta-sep\">|<\/span> <a class=\"link-comments\" href=\"https:\/\/www.datasecuritybreach.fr\/cyberattaques-mobiles-augmentent\/#respond\">0 Comment<\/a><\/p>\n<div class=\"categories\"><a href=\"https:\/\/www.datasecuritybreach.fr\/category\/smartphone-2\/android\/\" rel=\"category tag\">Android<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/communique-de-presse\/\" rel=\"category tag\">Communiqu\u00e9 de presse<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/cybersecurite\/\" rel=\"category tag\">Cybers\u00e9curit\u00e9<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/smartphone-2\/ios\/\" rel=\"category tag\">ios<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/smartphone-2\/securite-smartphone-2\/\" rel=\"category tag\">S\u00e9curit\u00e9<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/cybersecurite\/securite-informatique\/\" rel=\"category tag\">Securite informatique<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/smartphone-2\/\" rel=\"category tag\">Smartphone<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/cybersecurite\/telephonie\/\" rel=\"category tag\">T\u00e9l\u00e9phonie<\/a> <a href=\"https:\/\/www.datasecuritybreach.fr\/category\/smartphone-2\/windows-phone\/\" rel=\"category tag\">Windows phone<\/a><\/div>\n<\/div>\n<div class=\"page-content\">\n<div class=\"page-featured-image\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" src=\"https:\/\/i0.wp.com\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android.jpg?resize=1200%2C629&#038;ssl=1\" sizes=\"(max-width: 1200px) 100vw, 1200px\" srcset=\"https:\/\/i0.wp.com\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android.jpg?resize=1200%2C629&#038;ssl=1 1200w, https:\/\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android-300x157.jpg 300w, https:\/\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android-1024x536.jpg 1024w, https:\/\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android-500x261.jpg 500w, https:\/\/www.datasecuritybreach.fr\/wp-content\/uploads\/2013\/03\/android-642x336.jpg 642w\" alt=\"menaces informatiques CopyCat Igexin cyberattaques\" width=\"1200\" height=\"629\" data-recalc-dims=\"1\" \/><\/div>\n<h2>Une nouvelle enqu\u00eate men\u00e9e par Avast r\u00e9v\u00e8le que les cyberattaques \u00e0 l\u2019encontre des smartphones et tablettes Android ont connu une hausse d\u2019environ 40 % par rapport au second trimestre de l\u2019ann\u00e9e derni\u00e8re.<\/h2>\n<p>\u00ab\u00a0<strong><em>Les <a href=\"https:\/\/www.datasecuritybreach.fr\/?s=cyberattaques\" target=\"_blank\" rel=\"noopener\">cyberattaques<\/a> mobiles connaissent une forte hausse car les strat\u00e9gies des hackers deviennent de plus en plus agiles et dangereuses. Leurs cibles privil\u00e9gi\u00e9es sont les donn\u00e9es personnelles et la vie priv\u00e9e des utilisateurs<\/em><\/strong>, confie Gagan Singh, Directeur G\u00e9n\u00e9ral de la section mobile et IoT chez <a href=\"https:\/\/www.avast.com\/fr-fr\/index\" target=\"_blank\" rel=\"noopener\">Avast<\/a>. <strong><em>Nous mettons constamment \u00e0 jour nos solutions de s\u00e9curit\u00e9 mobiles afin de faire face aux nouvelles menaces\u00a0; en combinant des technologies, telles que l\u2019Intelligence Artificielle et l\u2019apprentissage automatique, au plus vaste r\u00e9seau de d\u00e9tection des menaces au monde, nous permettons aux consommateurs de rester en s\u00e9curit\u00e9 lorsqu\u2019ils sont connect\u00e9s. Les utilisateurs stockent leurs donn\u00e9es les plus pr\u00e9cieuses dans leurs smartphones, raison pour laquelle notre priorit\u00e9 est de d\u00e9velopper des outils pratiques, capables de prot\u00e9ger leur vie priv\u00e9e et de s\u00e9curiser leurs appareils ainsi que leurs donn\u00e9es<\/em>.<\/strong>\u00a0\u00bb<\/p>\n<p>https:\/\/www.datasecuritybreach.fr\/cyberattaques-mobiles-augmentent\/<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>By Damien Bancal | on Sep 24, 2017 | 0 Comment Android Communiqu\u00e9 de presse Cybers\u00e9curit\u00e9 ios S\u00e9curit\u00e9 Securite informatique Smartphone T\u00e9l\u00e9phonie Windows phone Une nouvelle enqu\u00eate men\u00e9e par Avast r\u00e9v\u00e8le que les cyberattaques \u00e0 l\u2019encontre des smartphones et tablettes Android ont connu une hausse d\u2019environ 40 % par rapport au second trimestre de l\u2019ann\u00e9e &#8230; <a title=\"Les cyberattaques mobiles ont augment\u00e9 de 40 %\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2017\/09\/27\/les-cyberattaques-mobiles-ont-augmente-de-40\/\" aria-label=\"Read more about Les cyberattaques mobiles ont augment\u00e9 de 40 %\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-k0","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1240"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=1240"}],"version-history":[{"count":2,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1240\/revisions"}],"predecessor-version":[{"id":1244,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/1240\/revisions\/1244"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=1240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=1240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=1240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}