{"id":140491,"date":"2022-02-25T01:25:35","date_gmt":"2022-02-25T09:25:35","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/uncategorized-fr-ca\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/"},"modified":"2022-02-25T01:25:35","modified_gmt":"2022-02-25T09:25:35","slug":"le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/","title":{"rendered":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe?"},"content":{"rendered":"<p>Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de services,\u00a0d\u2019applis\u00a0h\u00e9berg\u00e9es et m\u00eame de serveurs\u00a0de\u00a0jeux\u00a0populaires. Une faille permettrait aux pirates de\u00a0compromettre les\u00a0serveurs qui les\u00a0ex\u00e9cutent ou d\u2019en\u00a0prendre le contr\u00f4le.<\/p>\n<p>Comme l\u2019ont signal\u00e9\u00a0les d\u00e9veloppeurs du populaire jeu Minecraft, cette\u00a0faille\u00a0touche potentiellement les serveurs\u00a0qui ex\u00e9cutent le r\u00e9seau Twitter, le service iCloud d\u2019Apple,\u00a0la plateforme de jeu Steam et le nombre de sites vuln\u00e9rables augmente constamment.<\/p>\n<p><a href=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day\/\" target=\"_blank\" rel=\"noopener\">Un groupe de recherche a surnomm\u00e9 la vuln\u00e9rabilit\u00e9 \u00ab\u00a0Log4Shell\u00a0\u00bb,<\/a> et le nom semble avoir \u00e9t\u00e9 adopt\u00e9. Elle implique un\u00a0logiciel\u00a0tr\u00e8s\u00a0utilis\u00e9 pour consigner\u00a0des informations sur des serveurs.\u00a0Ce logiciel est une source ouverte, ce qui signifie qu\u2019il est disponible gratuitement pour les d\u00e9veloppeurs. En\u00a0cons\u00e9quence,\u00a0d\u2019innombrables\u00a0organisations et entreprises\u00a0l\u2019utilisent sur leurs serveurs.<\/p>\n<p>Bien que la situation continue de se pr\u00e9ciser, les chercheurs agissent avec un degr\u00e9\u00a0de prudence appropri\u00e9\u00a0compte tenu de\u00a0l\u2019ampleur potentielle\u00a0du probl\u00e8me.\u00a0Inutile de dire que\u00a0le\u00a0niveau de pr\u00e9occupation\u00a0imm\u00e9diat reste \u00e9lev\u00e9 \u00e9tant donn\u00e9 le\u00a0potentiel\u00a0d\u2019impact de\u00a0cette\u00a0faille\u00a0sur des millions de serveurs, d\u2019appareils et les personnes qui les utilisent.<\/p>\n<h2><strong>Comment un pirate peut-il exploiter cette vuln\u00e9rabilit\u00e9? \u00a0<\/strong><\/h2>\n<p>\u00c0 ce stade pr\u00e9coce, plusieurs \u00e9ventualit\u00e9s semblent possibles\u00a0:<\/p>\n<ul>\n<li>Un pirate pourrait acc\u00e9der aux journaux des serveurs\u00a0concern\u00e9s et rassembler les informations qui y sont conserv\u00e9es. Cela peut inclure tout type d\u2019informations provenant de sessions de clavardage, des noms d\u2019utilisateur, des mots de passe ou d\u2019autres renseignements, en fonction de ce qui est\u00a0consign\u00e9\u00a0par le site Web, l\u2019appli ou le service en question.<\/li>\n<li>Dans certains cas, la vuln\u00e9rabilit\u00e9 permettrait aux pirates d\u2019ex\u00e9cuter un code ou des fonctions pour compromettre le serveur cibl\u00e9, ou m\u00eame en prendre le contr\u00f4le. Par exemple, il y a eu\u00a0<a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1469322120840708100?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1469322120840708100%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.tenable.com%2Fblog%2Fcve-2021-44228-proof-of-concept-for-critical-apache-log4j-remote-code-execution-vulnerability\" target=\"_blank\" rel=\"noopener\">des signalements<\/a>\u00a0de serveurs compromis qui ont \u00e9t\u00e9 convertis pour extraire ill\u00e9galement de la cryptomonnaie.<\/li>\n<li>De m\u00eame, il est possible que les pirates utilisent davantage les serveurs\u00a0concern\u00e9s\u00a0pour distribuer des logiciels malveillants aux ordinateurs, t\u00e9l\u00e9phones et autres appareils qui leur sont connect\u00e9s.\u00a0Au moment d\u2019\u00e9crire ces lignes, nous n\u2019avons pas encore d\u00e9couvert de telles attaques. Cependant, des pirates informatiques d\u00e9termin\u00e9s pourraient tenter une telle attaque s\u2019ils pensent qu\u2019il y a des avantages \u00e0 le faire.<\/li>\n<\/ul>\n<h2><strong>Et si je connais quelqu\u2019un qui joue \u00e0 Minecraft ou ex\u00e9cute un serveur Minecraft?\u00a0<\/strong><\/h2>\n<p>Les d\u00e9veloppeurs de Minecraft ont fourni plusieurs \u00e9tapes qui d\u00e9taillent\u00a0ce que les joueurs et les h\u00f4tes\u00a0du serveur\u00a0doivent\u00a0faire\u00a0pour se prot\u00e9ger. Les d\u00e9veloppeurs reconnaissent clairement la gravit\u00e9 potentielle de la situation et adoptent une approche proactive en d\u00e9clarant\u00a0: \u00ab\u00a0Cette vuln\u00e9rabilit\u00e9 pr\u00e9sente un risque potentiel de compromission de votre ordinateur, et bien que cet faille ait \u00e9t\u00e9 corrig\u00e9e ainsi que toutes les versions du client du jeu, vous devez prendre [des mesures] pour s\u00e9curiser votre jeu et vos serveurs.\u00a0\u00bb Nous avons fourni le lien vers ces \u00e9tapes ici\u00a0:<\/p>\n<p><a href=\"https:\/\/www.minecraft.net\/en-us\/article\/important-message--security-vulnerability-java-edition\" target=\"_blank\" rel=\"noopener\">\u00c9tapes recommand\u00e9es pour les joueurs et les h\u00f4tes de serveur Minecraft.<\/a><\/p>\n<h2><strong>D\u2019autres fa\u00e7ons de vous prot\u00e9ger\u00a0<\/strong><\/h2>\n<p>\u00c0 l\u2019heure actuelle, tandis que cette situation \u00e9volue, la meilleure chose \u00e0 faire est de rester vigilant. Si l\u2019appli, le service, le site ou le jeu que vous utilisez fonctionne de mani\u00e8re \u00e9trange,\u00a0envisagez de vous d\u00e9connecter et de les fermer.\u00a0Ensuite,\u00a0effectuez\u00a0une\u00a0analyse de\u00a0s\u00e9curit\u00e9\u00a0sur votre appareil pour\u00a0rechercher\u00a0des\u00a0virus,\u00a0des logiciels malveillants ou d\u2019autres menaces.\u00a0Suivez les instructions de votre logiciel\u00a0de protection\u00a0en ligne si des r\u00e9sultats apparaissent.<\/p>\n<p>Vous pouvez \u00e9galement envisager de limiter l\u2019utilisation de votre\u00a0appli et\u00a0de vos services aux activit\u00e9s les plus\u00a0importantes.\u00a0S\u2019il ne s\u2019agit pas d\u2019une t\u00e2che ou d\u2019une activit\u00e9 en ligne urgente ou importante, essayez de la reporter jusqu\u2019\u00e0 ce que vous en sachiez plus.<\/p>\n<p>De m\u00eame, restez \u00e0 l\u2019aff\u00fbt.\u00a0Les d\u00e9tails concernant cette vuln\u00e9rabilit\u00e9 continuent de se pr\u00e9ciser.\u00a0\u00c0 mesure que ces d\u00e9tails sont d\u00e9voil\u00e9s, vous trouverez des conseils suppl\u00e9mentaires pour vous aider \u00e0 vous prot\u00e9ger et \u00e0 prot\u00e9ger votre famille contre ce probl\u00e8me ou des menaces connexes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de services,\u00a0d\u2019applis\u00a0h\u00e9berg\u00e9es&#8230;<\/p>\n","protected":false},"author":674,"featured_media":140494,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14056],"tags":[13882],"coauthors":[3973],"class_list":["post-140491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","tag-data-breach-fr-ca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-25T09:25:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe?\",\"datePublished\":\"2022-02-25T09:25:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"keywords\":[\"Data Breach\"],\"articleSection\":[\"Actualit\u00e9s sur la s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\",\"name\":\"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"datePublished\":\"2022-02-25T09:25:35+00:00\",\"description\":\"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"width\":300,\"height\":200,\"caption\":\"Leaked data, data breach, cybersecurity and hacked stolen data concepts. Hand with magnet steal data from unprotected computer, visual metaphor and concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s sur la s\u00e9curit\u00e9\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee","description":"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee","og_description":"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-02-25T09:25:35+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe?","datePublished":"2022-02-25T09:25:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","keywords":["Data Breach"],"articleSection":["Actualit\u00e9s sur la s\u00e9curit\u00e9"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/","name":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe? | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","datePublished":"2022-02-25T09:25:35+00:00","description":"Plusieurs chercheurs en mati\u00e8re de s\u00e9curit\u00e9 ont\u00a0r\u00e9cemment signal\u00e9 un bogue de logiciel\u00a0puissant qui pourrait toucher des milliers\u00a0de\u00a0sites Web, de","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","width":300,"height":200,"caption":"Leaked data, data breach, cybersecurity and hacked stolen data concepts. Hand with magnet steal data from unprotected computer, visual metaphor and concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/le-risque-de-securite-touchant-les-services-et-les-applis-populaires-vous-preoccupe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s sur la s\u00e9curit\u00e9","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/security-news\/"},{"@type":"ListItem","position":3,"name":"Le risque de s\u00e9curit\u00e9 touchant les services et les applis populaires vous pr\u00e9occupe?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/140491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/comments?post=140491"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/140491\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media\/140494"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media?parent=140491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/categories?post=140491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/tags?post=140491"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/coauthors?post=140491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}