{"id":106101,"date":"2020-03-11T10:28:23","date_gmt":"2020-03-11T17:28:23","guid":{"rendered":"\/blogs\/?p=106101"},"modified":"2025-03-26T19:06:49","modified_gmt":"2025-03-27T02:06:49","slug":"comment-mettre-fin-aux-usurpations-de-numero","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/","title":{"rendered":"Comment mettre fin aux usurpations de num\u00e9ro"},"content":{"rendered":"<h2><strong>Comment \u00e7a marche\u00a0?<\/strong><\/h2>\n<p>On appelle usurpation de num\u00e9ro le fait d&#8217;envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l&#8217;identit\u00e9 de l&#8217;appelant. La plupart des usurpations sont r\u00e9alis\u00e9es \u00e0 l&#8217;aide d&#8217;un service VoIP (Voice over Internet Protocol) ou d&#8217;un t\u00e9l\u00e9phone IP qui utilise la VoIP pour transmettre des appels sur Internet. Les utilisateurs de la VoIP peuvent g\u00e9n\u00e9ralement choisir le num\u00e9ro ou le nom \u00e0 afficher sur l&#8217;identification de l&#8217;appelant lors de la cr\u00e9ation de leur compte.<\/p>\n<p>Certains fournisseurs proposent m\u00eame des services de saisie de num\u00e9ro qui fonctionnent comme une carte d&#8217;appel pr\u00e9pay\u00e9e. Les clients paient pour obtenir un code\u00a0PIN \u00e0 utiliser lorsqu&#8217;ils appellent leur fournisseur, ce qui leur permet de s\u00e9lectionner \u00e0 la fois le num\u00e9ro de destination qu&#8217;ils veulent appeler, ainsi que le num\u00e9ro qu&#8217;ils veulent faire appara\u00eetre sur le t\u00e9l\u00e9phone du destinataire.<\/p>\n<h3><strong>Quels sont les dangers de l&#8217;usurpation d&#8217;identit\u00e9 par t\u00e9l\u00e9phone\u00a0?<\/strong><\/h3>\n<p>Les escrocs utilisent souvent l&#8217;usurpation d&#8217;identit\u00e9 pour tenter d&#8217;amener leurs victimes \u00e0 leur donner de l&#8217;argent, des informations personnelles, ou les deux. Ils peuvent pr\u00e9tendre appeler de la part d&#8217;une banque, d&#8217;une organisation caritative ou m\u00eame d&#8217;un concours, en offrant un prix fictif. Ces \u00ab\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/learn-phishing-phone\/\">vishing<\/a>\u00a0\u00bb (ou \u00ab\u00a0voice phishing\u00a0\u00bb), sont des attaques assez courantes et visent souvent des personnes \u00e2g\u00e9es qui ne sont pas toujours conscientes de cette menace.<\/p>\n<p>Par exemple, les arnaques qui semblent provenir de l&#8217;IRS (Internal Revenue Service) sont relativement courantes. L&#8217;appelant essaie d&#8217;effrayer le destinataire en lui faisant croire qu&#8217;il a des impay\u00e9s ou qu&#8217;il doit envoyer imm\u00e9diatement des informations bancaires. Une autre escroquerie courante est commise par le biais de\u00a0<a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-tech-support-scams\/\">faux supports techniques<\/a>. Les appelants pr\u00e9tendent provenir d&#8217;une soci\u00e9t\u00e9 connue, comme Microsoft, qu&#8217;il y a un probl\u00e8me avec votre ordinateur et que pour le r\u00e9soudre, un acc\u00e8s \u00e0 distance est n\u00e9cessaire.<\/p>\n<p>Il existe aussi le <a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fedex-sms-phishing-scam\/?hilite=%27smishing%27\">\u00ab\u00a0SMiShing\u00a0\u00bb<\/a>, phishing par SMS, par lequel vous pouvez recevoir un message qui semble provenir d&#8217;une personne ou d&#8217;une soci\u00e9t\u00e9 de bonne r\u00e9putation, vous encourageant \u00e0 cliquer sur un lien. Mais lorsque vous cliquez dessus, cela peut t\u00e9l\u00e9charger un\u00a0<a href=\"https:\/\/www.mcafee.com\/fr-fr\/antivirus\/malware.html\">logiciel malveillant<\/a>\u00a0sur votre appareil, vous inscrire \u00e0 un service payant ou m\u00eame r\u00e9cup\u00e9rer les identifiants de vos comptes en ligne.<\/p>\n<h2><strong>Pourquoi l&#8217;usurpation d&#8217;identit\u00e9 est-elle si r\u00e9pandue\u00a0?<\/strong><\/h2>\n<p>La facilit\u00e9 de l&#8217;envoi de messages vocaux num\u00e9riques sur Internet a entra\u00een\u00e9 une explosion du nombre de spams et d&#8217;appels provenant de robots au cours des derni\u00e8res ann\u00e9es. Selon Hiya, une soci\u00e9t\u00e9 qui propose des solutions t\u00e9l\u00e9phoniques anti-spam, le nombre d&#8217;appels de spam a atteint\u00a0<a href=\"https:\/\/hiya.com\/blog\/2019\/12\/13\/us-spam-grew-108-in-2019-as-anti-robocall-bill-moves-to-senate-for-approval\/\">54,6\u00a0milliards<\/a>\u00a0en 2019, soit une progression de 108\u00a0% par rapport \u00e0 l&#8217;ann\u00e9e pr\u00e9c\u00e9dente.<\/p>\n<p>Comme les appels automatiques utilisent un composeur informatis\u00e9 pour transmettre des messages pr\u00e9enregistr\u00e9s, les sp\u00e9cialistes du marketing et les escrocs peuvent passer beaucoup plus d&#8217;appels qu&#8217;une personne r\u00e9elle et ont souvent recours \u00e0 des astuces telles que faire croire que l&#8217;appel provient de votre indicatif r\u00e9gional. Cela augmente les chances que le destinataire r\u00e9ponde \u00e0 l&#8217;appel, pensant qu&#8217;il provient d&#8217;un ami ou d&#8217;une entreprise locale.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Que faire pour mettre fin \u00e0 ces appels\u00a0?<\/strong><\/h3>\n<p>Pour vraiment r\u00e9duire le nombre d&#8217;appels qui proviennent d&#8217;escrocs, la premi\u00e8re chose \u00e0 faire est de v\u00e9rifier si votre op\u00e9rateur t\u00e9l\u00e9phonique dispose d&#8217;un service ou d&#8217;une application qui permet d&#8217;identifier et de filtrer les appels de spam.<\/p>\n<p>Par exemple, AT&amp;T et Verizon proposent des applications payantes qui signalent les spams et alertent des fraudes. T-Mobile alerte les consommateurs si un appel semble frauduleux lorsqu&#8217;il appara\u00eet sur l&#8217;\u00e9cran de votre t\u00e9l\u00e9phone et vous pouvez souscrire gratuitement un service de blocage de spam.<\/p>\n<p>Il existe \u00e9galement des applications tierces comme RobotKiller et Nomorobo que vous pouvez t\u00e9l\u00e9charger pour vous aider \u00e0 rep\u00e9rer ces appels malveillants. Cependant, vous devrez partager avec elles vos informations personnelles.<\/p>\n<h3><strong>Autres conseils pour traiter les appels non d\u00e9sir\u00e9s<\/strong><\/h3>\n<ol>\n<li>En plus de votre inscription au Do Not Call Registry et de la v\u00e9rification des options propos\u00e9es par votre op\u00e9rateur, vous devez \u00eatre tr\u00e8s prudent lorsqu&#8217;il s&#8217;agit de communiquer vos coordonn\u00e9es. Si un formulaire en ligne vous demande votre num\u00e9ro de t\u00e9l\u00e9phone mais que le champ n&#8217;est pas obligatoire, laissez-le vide. \u00c9vitez \u00e9galement d&#8217;inscrire votre num\u00e9ro de t\u00e9l\u00e9phone personnel sur vos profils de r\u00e9seaux sociaux.<\/li>\n<li>Si vous recevez un appel d&#8217;un num\u00e9ro non reconnu, n&#8217;y r\u00e9pondez pas. Vous pouvez toujours rappeler plus tard pour savoir s&#8217;il s&#8217;agit d&#8217;une v\u00e9ritable personne ou entreprise. S&#8217;il s&#8217;agit d&#8217;un appel frauduleux, vous pouvez bloquer le num\u00e9ro dans votre t\u00e9l\u00e9phone, mais cela s&#8217;av\u00e8re parfois peu efficace car les escrocs changent souvent de num\u00e9ro.<\/li>\n<li>Lisez la politique de confidentialit\u00e9 de chaque nouveau service auquel vous souscrivez pour vous assurer qu&#8217;ils ne partageront ou ne vendront pas vos coordonn\u00e9es.<\/li>\n<li>M\u00e9fiez-vous des concours et des loteries en ligne, car ils partagent souvent des donn\u00e9es avec d&#8217;autres entreprises.<\/li>\n<li>Restez inform\u00e9 sur les derni\u00e8res techniques d&#8217;usurpation pour \u00eatre pr\u00e9par\u00e9 et installez\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mobile.html\">des solutions de s\u00e9curit\u00e9<\/a>\u00a0sur votre t\u00e9l\u00e9phone pour vous aider \u00e0 vous prot\u00e9ger contre les logiciels malveillants et autres menaces.<\/li>\n<\/ol>\n<p><em>Vous souhaitez obtenir davantage de conseils et vous tenir inform\u00e9 des tendances en mati\u00e8re de s\u00e9curit\u00e9 mobile\u00a0? Suivez\u00a0<\/em><a href=\"https:\/\/twitter.com\/McAfee_Home\"><em>@McAfee Home<\/em><\/a><em>\u00a0sur Twitter, et aimez notre page Facebook.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d&#8217;envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l&#8217;identit\u00e9 de l&#8217;appelant&#8230;.<\/p>\n","protected":false},"author":674,"featured_media":82056,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12001,11956,11926],"tags":[],"coauthors":[16309,16367],"class_list":["post-106101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","category-tips-tricks","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d&#039;envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l&#039;identit\u00e9 de l&#039;appelant. La .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d&#039;envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l&#039;identit\u00e9 de l&#039;appelant. La .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-11T17:28:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T02:06:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Comment mettre fin aux usurpations de num\u00e9ro\",\"datePublished\":\"2020-03-11T17:28:23+00:00\",\"dateModified\":\"2025-03-27T02:06:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\"},\"wordCount\":991,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg\",\"articleSection\":[\"Protection de l'identit\u00e9 et de la confidentialit\u00e9\",\"Astuces &amp; Conseils\",\"S\u00e9curit\u00e9 mobile\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\",\"name\":\"Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg\",\"datePublished\":\"2020-03-11T17:28:23+00:00\",\"dateModified\":\"2025-03-27T02:06:49+00:00\",\"description\":\"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d'envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l'identit\u00e9 de l'appelant. La .\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 mobile\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comment mettre fin aux usurpations de num\u00e9ro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee","description":"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d'envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l'identit\u00e9 de l'appelant. La .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee","og_description":"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d'envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l'identit\u00e9 de l'appelant. La .","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-03-11T17:28:23+00:00","article_modified_time":"2025-03-27T02:06:49+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Comment mettre fin aux usurpations de num\u00e9ro","datePublished":"2020-03-11T17:28:23+00:00","dateModified":"2025-03-27T02:06:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/"},"wordCount":991,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg","articleSection":["Protection de l'identit\u00e9 et de la confidentialit\u00e9","Astuces &amp; Conseils","S\u00e9curit\u00e9 mobile"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/","name":"Comment mettre fin aux usurpations de num\u00e9ro | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg","datePublished":"2020-03-11T17:28:23+00:00","dateModified":"2025-03-27T02:06:49+00:00","description":"Comment \u00e7a marche\u00a0? On appelle usurpation de num\u00e9ro le fait d'envoyer d\u00e9lib\u00e9r\u00e9ment de fausses informations pour modifier l'identit\u00e9 de l'appelant. La .","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/img_1583452735289228.jpg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/comment-mettre-fin-aux-usurpations-de-numero\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 mobile","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Comment mettre fin aux usurpations de num\u00e9ro"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/106101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=106101"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/106101\/revisions"}],"predecessor-version":[{"id":211522,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/106101\/revisions\/211522"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media\/82056"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=106101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=106101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=106101"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=106101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}