﻿{"id":1039,"date":"2019-10-09T08:40:25","date_gmt":"2019-10-09T12:40:25","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1039"},"modified":"2019-10-09T08:40:27","modified_gmt":"2019-10-09T12:40:27","slug":"tentative-darnaque-facture-frauduleuse","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/tentative-darnaque-facture-frauduleuse\/","title":{"rendered":"Tentative d&rsquo;arnaque &#8211; Facture frauduleuse"},"content":{"rendered":"\n<p style=\"background-color:#5a7410\" class=\"has-text-color has-background has-very-light-gray-color\">Ceci est un exemple de facture frauduleuse qui circule actuellement, \u00e9vitez de cliquer sur l&rsquo;hyperlien et supprimez le courriel ou message texte.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"308\" height=\"629\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/image-1.png\" alt=\"\" class=\"wp-image-1040\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/image-1.png 308w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/image-1-147x300.png 147w\" sizes=\"auto, (max-width: 308px) 100vw, 308px\" \/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ceci est un exemple de facture frauduleuse qui circule actuellement, \u00e9vitez de cliquer sur l&rsquo;hyperlien et supprimez le courriel ou message texte.<\/p>\n","protected":false},"author":4,"featured_media":241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-1039","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-tentatives-de-fraude"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1039"}],"version-history":[{"count":7,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1039\/revisions"}],"predecessor-version":[{"id":1047,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1039\/revisions\/1047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/241"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}