﻿{"id":1401,"date":"2020-03-04T10:49:02","date_gmt":"2020-03-04T14:49:02","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1401"},"modified":"2020-03-04T10:50:19","modified_gmt":"2020-03-04T14:50:19","slug":"vol-de-donnees","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/vol-de-donnees\/","title":{"rendered":"Vol de donn\u00e9es"},"content":{"rendered":"\n<p>Dans La Presse \u00ab\u00a0Une attaque informatique visant la Cour municipale de la Ville de Mont-Saint-Hilaire a permis \u00e0 des pirates de subtiliser des informations de citoyens ayant re\u00e7u un constat d\u2019infraction entre le 17\u00a0juillet\u00a02019 et le 14\u00a0f\u00e9vrier\u00a02020.\u00a0\u00bb  <\/p>\n\n\n\n<p><a href=\"https:\/\/www.lapresse.ca\/actualites\/202003\/03\/01-5263235-des-milliers-de-fichiers-pirates-a-la-cour-municipale-de-mont-saint-hilaire.php\">Voir\u00a0l&rsquo;article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans La Presse \u00ab\u00a0Une attaque informatique visant la Cour municipale de la Ville de Mont-Saint-Hilaire a permis \u00e0 des pirates de subtiliser des informations de citoyens ayant re\u00e7u un constat d\u2019infraction entre le 17 juillet 2019 et le 14 f\u00e9vrier 2020. \u00ab\u00a0<\/p>\n","protected":false},"author":4,"featured_media":1402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1401"}],"version-history":[{"count":4,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1401\/revisions"}],"predecessor-version":[{"id":1406,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1401\/revisions\/1406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1402"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}