{"id":82320,"date":"2024-12-01T20:34:10","date_gmt":"2024-12-01T19:34:10","guid":{"rendered":"https:\/\/matuile.com\/media\/?p=82320"},"modified":"2024-12-01T20:36:34","modified_gmt":"2024-12-01T19:36:34","slug":"phishing","status":"publish","type":"post","link":"https:\/\/matuile.com\/media\/phishing\/","title":{"rendered":"Phishing : D\u00e9finition informatique"},"content":{"rendered":"<p style=\"font-size:16px;font-style:normal;font-weight:100\">Le <strong>phishing<\/strong> est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations sensibles comme des mots de passe, des num\u00e9ros de carte bancaire ou des identifiants personnels. Cela se fait souvent par le biais de messages (<strong><a href=\"https:\/\/matuile.com\/media\/mail-definition-informatique\/\">emails<\/a><\/strong>, <strong><a href=\"https:\/\/matuile.com\/media\/sms-texto\/\">SMS<\/a><\/strong>, messages sur les <strong><a href=\"https:\/\/matuile.com\/media\/reseau-social-definition-juridique\/\">r\u00e9seaux sociaux<\/a><\/strong>) ou de sites web qui semblent provenir d&rsquo;une source fiable comme une banque ou un site de commerce.<\/p><p style=\"font-size:16px;font-style:normal;font-weight:100\">Les messages de <strong>phishing<\/strong> contiennent g\u00e9n\u00e9ralement un <strong><a href=\"https:\/\/matuile.com\/media\/lien-hypertexte-definition-informatique\/\">lien<\/a><\/strong> vers un <strong>site web frauduleux<\/strong> qui ressemble \u00e0 un site l\u00e9gitime. L&rsquo;utilisateur est alors incit\u00e9 \u00e0 entrer ses informations personnelles qui sont ensuite r\u00e9cup\u00e9r\u00e9es par les attaquants pour commettre des actes malveillants (vol d&rsquo;argent, usurpation d&rsquo;identit\u00e9, etc.).<\/p><p style=\"font-size:16px;font-style:normal;font-weight:100\">Les tentatives de <strong>phishing<\/strong> peuvent se pr\u00e9senter sous diff\u00e9rentes formes, notamment :<\/p><ul class=\"wp-block-list\"><li style=\"font-size:16px;font-style:normal;font-weight:100\"><strong>Emails de phishing<\/strong> : Messages imitant des institutions bancaires, des services en ligne ou des entreprises, demandant \u00e0 l&rsquo;utilisateur de \u00ab\u00a0<strong>v\u00e9rifier<\/strong>\u00a0\u00bb ou \u00ab\u00a0<strong>mettre \u00e0 jour<\/strong>\u00a0\u00bb ses informations.<\/li>\n\n<li style=\"font-size:16px;font-style:normal;font-weight:100\"><strong>Phishing par SMS (smishing)<\/strong> : Envoi de messages texte incitant l&rsquo;utilisateur \u00e0 cliquer sur un <strong>lien malveillant<\/strong>.<\/li>\n\n<li style=\"font-size:16px;font-style:normal;font-weight:100\"><strong>Phishing vocal (vishing)<\/strong> : Appels t\u00e9l\u00e9phoniques o\u00f9 l&rsquo;escroc se fait passer pour un repr\u00e9sentant l\u00e9gitime et demande des informations personnelles.<\/li><\/ul><div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><p style=\"font-size:16px;font-style:normal;font-weight:100\">Pour se prot\u00e9ger du <strong>phishing<\/strong>, il est important de v\u00e9rifier les adresses des sites web, de ne jamais cliquer sur des liens suspects et d&rsquo;utiliser des outils de s\u00e9curit\u00e9 comme un filtre anti-spam, une <strong><a href=\"https:\/\/matuile.com\/media\/pourquoi-une-sandbox-est-cruciale-pour-la-protection-de-votre-ordinateur-et-smartphone\/\">sandbox<\/a><\/strong> ou un antivirus.<\/p><div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><p class=\"has-text-align-center\" style=\"font-size:19px;font-style:normal;font-weight:700\">Apprenez d\u00e9finition apr\u00e8s d\u00e9finition :<\/p><p class=\"has-text-align-center\" style=\"font-size:34px;font-style:normal;font-weight:100\"><strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-a\/\">A<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-b\/\">B<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-c\/\">C<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-d\/\">D<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-e\/\">E<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-f\/\">F<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-g\/\">G<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-h\/\">H<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-i\/\">I<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-j\/\">J<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-k\/\">K<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-l\/\">L<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-m\/\">M<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-n\/\">N<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-o\/\">O<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-p\/\">P<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-q\/\">Q<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-r\/\">R<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-s\/\">S<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-t\/\">T<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-u\/\">U<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-v\/\">V<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-w\/\">W<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-x\/\">X<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-y\/\">Y<\/a><\/strong> <strong><a href=\"https:\/\/matuile.com\/media\/dictionnaire-informatique-lettre-z\/\">Z<\/a><\/strong><\/p><div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div><hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>","protected":false},"excerpt":{"rendered":"<p>Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations sensibles&#8230;<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[344],"tags":[],"class_list":{"0":"post-82320","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-dictionnaire-informatique"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing : D\u00e9finition informatique - Matuile<\/title>\n<meta name=\"description\" content=\"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/matuile.com\/media\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing : D\u00e9finition informatique - Matuile\" \/>\n<meta property=\"og:description\" content=\"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/matuile.com\/media\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Matuile\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-01T19:34:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-01T19:36:34+00:00\" \/>\n<meta name=\"author\" content=\"Lucas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/\"},\"author\":{\"name\":\"Lucas\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/person\\\/6df827225180b6f3870274908b543185\"},\"headline\":\"Phishing : D\u00e9finition informatique\",\"datePublished\":\"2024-12-01T19:34:10+00:00\",\"dateModified\":\"2024-12-01T19:36:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/\"},\"wordCount\":243,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\"},\"articleSection\":[\"Dictionnaire informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/\",\"name\":\"Phishing : D\u00e9finition informatique - Matuile\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#website\"},\"datePublished\":\"2024-12-01T19:34:10+00:00\",\"dateModified\":\"2024-12-01T19:36:34+00:00\",\"description\":\"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Guide informatique\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/category\\\/guide-informatique\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dictionnaire informatique\",\"item\":\"https:\\\/\\\/matuile.com\\\/media\\\/category\\\/guide-informatique\\\/dictionnaire-informatique\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing : D\u00e9finition informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#website\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/\",\"name\":\"Matuile Blog\",\"description\":\"La solution \u00e0 votre urgence\",\"publisher\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\"},\"alternateName\":\"Matuile\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/matuile.com\\\/media\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#organization\",\"name\":\"Matuile\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Matuile.png\",\"contentUrl\":\"https:\\\/\\\/matuile.com\\\/media\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Matuile.png\",\"width\":700,\"height\":700,\"caption\":\"Matuile\"},\"image\":{\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/matuile.com\\\/media\\\/#\\\/schema\\\/person\\\/6df827225180b6f3870274908b543185\",\"name\":\"Lucas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g\",\"caption\":\"Lucas\"},\"url\":\"https:\\\/\\\/matuile.com\\\/media\\\/author\\\/lucas\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing : D\u00e9finition informatique - Matuile","description":"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/matuile.com\/media\/phishing\/","og_locale":"fr_FR","og_type":"article","og_title":"Phishing : D\u00e9finition informatique - Matuile","og_description":"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...","og_url":"https:\/\/matuile.com\/media\/phishing\/","og_site_name":"Matuile","article_published_time":"2024-12-01T19:34:10+00:00","article_modified_time":"2024-12-01T19:36:34+00:00","author":"Lucas","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Lucas","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/matuile.com\/media\/phishing\/#article","isPartOf":{"@id":"https:\/\/matuile.com\/media\/phishing\/"},"author":{"name":"Lucas","@id":"https:\/\/matuile.com\/media\/#\/schema\/person\/6df827225180b6f3870274908b543185"},"headline":"Phishing : D\u00e9finition informatique","datePublished":"2024-12-01T19:34:10+00:00","dateModified":"2024-12-01T19:36:34+00:00","mainEntityOfPage":{"@id":"https:\/\/matuile.com\/media\/phishing\/"},"wordCount":243,"commentCount":0,"publisher":{"@id":"https:\/\/matuile.com\/media\/#organization"},"articleSection":["Dictionnaire informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/matuile.com\/media\/phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/matuile.com\/media\/phishing\/","url":"https:\/\/matuile.com\/media\/phishing\/","name":"Phishing : D\u00e9finition informatique - Matuile","isPartOf":{"@id":"https:\/\/matuile.com\/media\/#website"},"datePublished":"2024-12-01T19:34:10+00:00","dateModified":"2024-12-01T19:36:34+00:00","description":"Le phishing est une technique de fraude en ligne utilis\u00e9e par des cybercriminels pour tromper les utilisateurs et obtenir des informations...","breadcrumb":{"@id":"https:\/\/matuile.com\/media\/phishing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/matuile.com\/media\/phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/matuile.com\/media\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/matuile.com\/media\/"},{"@type":"ListItem","position":2,"name":"Guide informatique","item":"https:\/\/matuile.com\/media\/category\/guide-informatique\/"},{"@type":"ListItem","position":3,"name":"Dictionnaire informatique","item":"https:\/\/matuile.com\/media\/category\/guide-informatique\/dictionnaire-informatique\/"},{"@type":"ListItem","position":4,"name":"Phishing : D\u00e9finition informatique"}]},{"@type":"WebSite","@id":"https:\/\/matuile.com\/media\/#website","url":"https:\/\/matuile.com\/media\/","name":"Matuile Blog","description":"La solution \u00e0 votre urgence","publisher":{"@id":"https:\/\/matuile.com\/media\/#organization"},"alternateName":"Matuile","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/matuile.com\/media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/matuile.com\/media\/#organization","name":"Matuile","url":"https:\/\/matuile.com\/media\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/matuile.com\/media\/#\/schema\/logo\/image\/","url":"https:\/\/matuile.com\/media\/wp-content\/uploads\/2023\/04\/Matuile.png","contentUrl":"https:\/\/matuile.com\/media\/wp-content\/uploads\/2023\/04\/Matuile.png","width":700,"height":700,"caption":"Matuile"},"image":{"@id":"https:\/\/matuile.com\/media\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/matuile.com\/media\/#\/schema\/person\/6df827225180b6f3870274908b543185","name":"Lucas","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02da3bf4d72c8de1f2df5d59206028e6d74b68d5a2c4b911bbcc5605dea16c52?s=96&d=mm&r=g","caption":"Lucas"},"url":"https:\/\/matuile.com\/media\/author\/lucas\/"}]}},"_links":{"self":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/82320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/comments?post=82320"}],"version-history":[{"count":7,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/82320\/revisions"}],"predecessor-version":[{"id":83728,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/posts\/82320\/revisions\/83728"}],"wp:attachment":[{"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/media?parent=82320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/categories?post=82320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matuile.com\/media\/wp-json\/wp\/v2\/tags?post=82320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}