﻿{"id":2463,"date":"2023-10-10T07:00:45","date_gmt":"2023-10-10T12:00:45","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2463"},"modified":"2023-10-11T07:09:29","modified_gmt":"2023-10-11T12:09:29","slug":"les-entrees-massives-de-pourriel-cette-semaine","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/les-entrees-massives-de-pourriel-cette-semaine\/","title":{"rendered":"Les entr\u00e9es massives de pourriel du moment."},"content":{"rendered":"\n<p class=\"has-white-color has-text-color has-background\" style=\"background-color:#5a7410\">Ne cliquez pas sur les hyperliens, n&rsquo;ouvrez pas les pi\u00e8ces attach\u00e9es, supprimez sur r\u00e9ception<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"376\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/image.png\" alt=\"\" class=\"wp-image-2817\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/image.png 748w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/image-300x151.png 300w\" sizes=\"auto, (max-width: 748px) 100vw, 748px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"595\" height=\"570\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/Capture-1.png\" alt=\"\" class=\"wp-image-2815\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/Capture-1.png 595w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/10\/Capture-1-300x287.png 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"637\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image-1.png\" alt=\"\" class=\"wp-image-2758\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image-1.png 609w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image-1-287x300.png 287w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"521\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image.png\" alt=\"\" class=\"wp-image-2755\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image.png 667w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/06\/image-300x234.png 300w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"607\" height=\"841\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/05\/image.png\" alt=\"\" class=\"wp-image-2750\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/05\/image.png 607w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2023\/05\/image-217x300.png 217w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"345\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/12\/image.png\" alt=\"\" class=\"wp-image-2723\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/12\/image.png 762w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/12\/image-300x136.png 300w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/11\/image-1024x273.png\" alt=\"\" class=\"wp-image-2720\" style=\"width:827px;height:220px\" width=\"827\" height=\"220\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/11\/image-1024x273.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/11\/image-300x80.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/11\/image-768x205.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/11\/image.png 1083w\" sizes=\"auto, (max-width: 827px) 100vw, 827px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"530\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/image.png\" alt=\"\" class=\"wp-image-2673\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/image.png 703w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/image-300x226.png 300w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"769\" height=\"399\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/09\/image.png\" alt=\"\" class=\"wp-image-2594\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/09\/image.png 769w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/09\/image-300x156.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/09\/image-768x398.png 768w\" sizes=\"auto, (max-width: 769px) 100vw, 769px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"721\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/07\/image.png\" alt=\"\" class=\"wp-image-2570\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/07\/image.png 625w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/07\/image-260x300.png 260w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"838\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image-1.png\" alt=\"\" class=\"wp-image-2568\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image-1.png 667w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image-1-239x300.png 239w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"451\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image.png\" alt=\"\" class=\"wp-image-2565\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/06\/image-300x176.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"381\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-4.png\" alt=\"\" class=\"wp-image-2556\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-4.png 679w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-4-300x168.png 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"550\" height=\"744\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-3.png\" alt=\"\" class=\"wp-image-2554\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-3.png 550w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-3-222x300.png 222w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"782\" height=\"789\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-2.png\" alt=\"\" class=\"wp-image-2551\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-2.png 782w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-2-150x150.png 150w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-2-297x300.png 297w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-2-768x775.png 768w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"726\" height=\"785\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-1.png\" alt=\"\" class=\"wp-image-2549\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-1.png 726w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/05\/image-1-277x300.png 277w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"813\" height=\"437\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-6.png\" alt=\"\" class=\"wp-image-2545\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-6.png 813w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-6-300x161.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-6-768x413.png 768w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"767\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-5.png\" alt=\"\" class=\"wp-image-2542\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-5.png 745w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-5-291x300.png 291w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"804\" height=\"603\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-4.png\" alt=\"\" class=\"wp-image-2540\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-4.png 804w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-4-300x225.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-4-768x576.png 768w\" sizes=\"auto, (max-width: 804px) 100vw, 804px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"585\" height=\"779\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-3.png\" alt=\"\" class=\"wp-image-2538\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-3.png 585w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-3-225x300.png 225w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"221\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-2.png\" alt=\"\" class=\"wp-image-2534\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-2.png 510w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-2-300x130.png 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"563\" height=\"158\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-1.png\" alt=\"\" class=\"wp-image-2532\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-1.png 563w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-1-300x84.png 300w\" sizes=\"auto, (max-width: 563px) 100vw, 563px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"682\" height=\"463\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image.png\" alt=\"\" class=\"wp-image-2530\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image.png 682w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/04\/image-300x204.png 300w\" sizes=\"auto, (max-width: 682px) 100vw, 682px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"613\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-5.png\" alt=\"\" class=\"wp-image-2528\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-5.png 703w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-5-300x262.png 300w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"750\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-4.png\" alt=\"\" class=\"wp-image-2526\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-4.png 776w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-4-300x290.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-4-768x742.png 768w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"433\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-1.png\" alt=\"\" class=\"wp-image-2518\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-1.png 498w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-1-300x261.png 300w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"662\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image.png\" alt=\"\" class=\"wp-image-2515\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image.png 779w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-300x255.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/03\/image-768x653.png 768w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"506\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-8.png\" alt=\"\" class=\"wp-image-2502\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-8.png 491w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-8-291x300.png 291w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"698\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-7.png\" alt=\"\" class=\"wp-image-2499\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-7.png 936w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-7-300x224.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-7-768x573.png 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"544\" height=\"210\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-6.png\" alt=\"\" class=\"wp-image-2496\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-6.png 544w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-6-300x116.png 300w\" sizes=\"auto, (max-width: 544px) 100vw, 544px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"541\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-5.png\" alt=\"\" class=\"wp-image-2492\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-5.png 724w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-5-300x224.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"630\" height=\"590\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-4.png\" alt=\"\" class=\"wp-image-2490\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-4.png 630w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-4-300x281.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"482\" height=\"268\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-3.png\" alt=\"\" class=\"wp-image-2487\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-3.png 482w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-3-300x167.png 300w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/figure>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:69px;height:69px\" width=\"69\" height=\"69\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"847\" height=\"740\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/convocation.jpg\" alt=\"\" class=\"wp-image-2484\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/convocation.jpg 847w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/convocation-300x262.jpg 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/convocation-768x671.jpg 768w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:78px;height:78px\" width=\"78\" height=\"78\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"635\" height=\"674\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-2.png\" alt=\"\" class=\"wp-image-2478\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-2.png 635w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-2-283x300.png 283w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:77px;height:77px\" width=\"77\" height=\"77\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"641\" height=\"430\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image.png\" alt=\"\" class=\"wp-image-2473\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image.png 641w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/image-300x201.png 300w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"\" class=\"wp-image-242\" style=\"width:87px;height:87px\" width=\"87\" height=\"87\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg 340w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam-150x150.jpg 150w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam-300x300.jpg 300w\" sizes=\"auto, (max-width: 87px) 100vw, 87px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/netflix.jpg\" alt=\"\" class=\"wp-image-2464\" style=\"width:580px;height:356px\" width=\"580\" height=\"356\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/netflix.jpg 716w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/netflix-300x184.jpg 300w\" sizes=\"auto, (max-width: 580px) 100vw, 580px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2018\/11\/spam.jpg\" alt=\"L\u2019attribut alt de cette image est vide, son nom de fichier est spam.jpg.\" style=\"width:89px;height:89px\" width=\"89\" height=\"89\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"588\" height=\"392\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/courriel.jpg\" alt=\"\" class=\"wp-image-2465\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/courriel.jpg 588w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/01\/courriel-300x200.jpg 300w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les tentatives massives d&rsquo;arnaque par courriel de cette semaine.<\/p>\n","protected":false},"author":9,"featured_media":242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-2463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-tentatives-de-fraude"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2463"}],"version-history":[{"count":47,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2463\/revisions"}],"predecessor-version":[{"id":2838,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2463\/revisions\/2838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/242"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}