﻿{"id":1573,"date":"2020-08-13T08:37:16","date_gmt":"2020-08-13T12:37:16","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1573"},"modified":"2020-08-13T08:45:38","modified_gmt":"2020-08-13T12:45:38","slug":"augmentation-des-attaques-a-un-rythme-alarmant","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/augmentation-des-attaques-a-un-rythme-alarmant\/","title":{"rendered":"Augmentation des attaques \u00e0 un rythme alarmant"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/10\/hacker-2300772_1920-1024x683.jpg\" alt=\"\" class=\"wp-image-111\" width=\"203\" height=\"135\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/10\/hacker-2300772_1920-1024x683.jpg 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/10\/hacker-2300772_1920-300x200.jpg 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/10\/hacker-2300772_1920-768x512.jpg 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/10\/hacker-2300772_1920.jpg 1920w\" sizes=\"auto, (max-width: 203px) 100vw, 203px\" \/><\/figure><\/div>\n\n\n\n<p> <em>\u00ab Les cybercriminels sont en train de d\u00e9velopper et d\u2019augmenter leurs attaques \u00e0 un rythme alarmant, exploitant la peur et l\u2019incertitude caus\u00e9es par la situation \u00e9conomique et sociale instable du fait du Covid-19 \u00bb<\/em>, a d\u00e9clar\u00e9 dans un communiqu\u00e9 le secr\u00e9taire g\u00e9n\u00e9ral d\u2019Interpol J\u00fcrgen Stock.<\/p>\n\n\n\n<p> \u00ab Twitter, dans la nuit du 15 juillet 2020, a connu ce qui en deviendra\u00a0<a href=\"https:\/\/www.presse-citron.net\/cyber-attaque-que-sest-il-vraiment-passe-cette-nuit-sur-twitter\/\">la plus importante attaque informatique<\/a>\u00a0de son histoire. Quelque temps apr\u00e8s vient de tour de\u00a0<a href=\"https:\/\/www.presse-citron.net\/garmin-aurait-paye-plusieurs-millions-de-dollars-de-rancon-pour-rouvrir-ses-services\/\">Garmin \u00e0 conna\u00eetre un\u00a0<em>hacking\u00a0<\/em>massif<\/a>, durant pr\u00e8s d\u2019une semaine et rendant inactif ses produits commercialis\u00e9s. Enfin, en ce d\u00e9but du mois d\u2019ao\u00fbt, ce fut \u00e0\u00a0<a href=\"https:\/\/www.presse-citron.net\/canon-egalement-victime-dun-ransomware\/\">Canon d\u2019\u00eatre la proie \u00e0 un ransomware<\/a>.\u00bb  <\/p>\n\n\n\n<p><a href=\"https:\/\/www.presse-citron.net\/des-attaques-a-un-rythme-alarmant-interpol-salarme-sur-la-cybersecurite\/\">Lire l&rsquo;article\u00a0en\u00a0entier<\/a><\/p>\n\n\n\n<p>Pour att\u00e9nuer le risque d&rsquo;\u00eatre victime d&rsquo;une cyberattaque consultez le guide des <a href=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/Semaine-5-Meilleures-pratiques-1.pdf\">meilleures pratiques<\/a>.  <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab Les cybercriminels sont en train de d\u00e9velopper et d\u2019augmenter leurs attaques \u00e0 un rythme alarmant, exploitant la peur et l\u2019incertitude caus\u00e9es par la situation \u00e9conomique et sociale instable du fait du Covid-19 \u00bb, a d\u00e9clar\u00e9 dans un communiqu\u00e9 le secr\u00e9taire g\u00e9n\u00e9ral d\u2019Interpol J\u00fcrgen Stock. \u00ab Twitter, dans la nuit du 15 juillet 2020, a [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1573"}],"version-history":[{"count":7,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1573\/revisions"}],"predecessor-version":[{"id":1581,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1573\/revisions\/1581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/111"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}