﻿{"id":1819,"date":"2020-10-30T08:39:06","date_gmt":"2020-10-30T12:39:06","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1819"},"modified":"2020-10-30T08:39:09","modified_gmt":"2020-10-30T12:39:09","slug":"les-attaques-au-rancongiciel","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/les-attaques-au-rancongiciel\/","title":{"rendered":"Les attaques au ran\u00e7ongiciel"},"content":{"rendered":"\n<p style=\"background-color:#5a7410\" class=\"has-text-color has-background has-medium-font-size has-very-light-gray-color\">\u00ab Je pense que la situation actuelle de pand\u00e9mie offre un climat propice aux gens qui veulent prendre avantage des vuln\u00e9rabilit\u00e9s \u00bb, dit Andr\u00e9 Boucher, dirigeant associ\u00e9 du Centre canadien pour la cybers\u00e9curit\u00e9 (CCC), l\u2019organisme f\u00e9d\u00e9ral charg\u00e9 de coordonner la s\u00e9curit\u00e9 informatique. <br><strong><a href=\"https:\/\/www.journaldemontreal.com\/2020\/10\/30\/de-plus-en-plus-dattaques-au-rancongiciel\">Lire&nbsp;l&rsquo;article<\/a><\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"269\" height=\"187\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2020\/10\/rancon.jpg\" alt=\"\" class=\"wp-image-1820\"\/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Municipalit\u00e9s, organismes sans but lucratif, h\u00f4pitaux, entreprises&#8230; Les attaques au ran\u00e7ongiciel se multiplient, sans discrimination, constatent les autorit\u00e9s f\u00e9d\u00e9rales.<\/p>\n","protected":false},"author":4,"featured_media":1820,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1819"}],"version-history":[{"count":3,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1819\/revisions"}],"predecessor-version":[{"id":1823,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1819\/revisions\/1823"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1820"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}