﻿{"id":249,"date":"2018-12-13T08:30:28","date_gmt":"2018-12-13T07:30:28","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?p=249"},"modified":"2019-01-08T16:07:45","modified_gmt":"2019-01-08T15:07:45","slug":"lactualite","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/lactualite\/","title":{"rendered":"L&rsquo;actualit\u00e9"},"content":{"rendered":"<h5 style=\"color: #5a7411;\">L&rsquo;actualit\u00e9 en cybers\u00e9curit\u00e9.<\/h5>\n<p><a Href=\"https:\/\/www.lapresse.ca\/actualites\/justice-et-faits-divers\/actualites-judiciaires\/201812\/13\/01-5207920-cour-supreme-le-droit-a-la-vie-privee-sur-un-ordinateur-partage-confirme.php\">La Presse &#8211; Droit \u00e0 la vie priv\u00e9e.<\/a><br \/>\n<a Href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-500-millions-de-clients-des-hotels-marriott-pirates-73593.html?utm_source=ActiveCampaign&#038;utm_medium=email&#038;utm_campaign=NL+LMI+Quoti+03122018&#038;ep_ee=c699293ffe46dc17b700d097beede03dd3b66bf5\">Le monde informatique &#8211; H\u00f4tels Mariott pirat\u00e9s.<\/a><br \/>\n<a Href=\"https:\/\/www.journaldemontreal.com\/2018\/11\/27\/protection-de-la-vie-privee-attention-aux-jouets-connectes\">Journal de Montr\u00e9al &#8211; Les jouets intelligents.<\/a><br \/>\n<a href=\"https:\/\/www.tvanouvelles.ca\/2018\/11\/25\/des-precautions-a-prendre-pour-le-cyberlundi\">Tva Nouvelles &#8211; Le cyberlundi.<\/a><br \/>\n<a href=\"https:\/\/www.journaldemontreal.com\/2018\/11\/20\/les-menaces-informatiques-explosent-au-quebec?utm_sources=j5_app&amp;utm_mediums=social&amp;share_article=share_article\">Journal de Montr\u00e9al &#8211; Les menaces informatiques explosent au Qu\u00e9bec.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;actualit\u00e9 en cybers\u00e9curit\u00e9. La Presse &#8211; Droit \u00e0 la vie priv\u00e9e. Le monde informatique &#8211; H\u00f4tels Mariott pirat\u00e9s. Journal de Montr\u00e9al &#8211; Les jouets intelligents. Tva Nouvelles &#8211; Le cyberlundi. Journal de Montr\u00e9al &#8211; Les menaces informatiques explosent au Qu\u00e9bec.<\/p>\n","protected":false},"author":4,"featured_media":250,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":10,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/249\/revisions\/305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/250"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}