{"id":176254,"date":"2023-11-08T03:51:41","date_gmt":"2023-11-08T11:51:41","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=176254"},"modified":"2023-11-08T04:30:00","modified_gmt":"2023-11-08T12:30:00","slug":"mcafee-2023-hacker-celebrity-hot-list","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/","title":{"rendered":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques"},"content":{"rendered":"<p><span data-contrast=\"none\">Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n&#8217;importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">La star de Barbie et d&#8217;une multitude d&#8217;autres films \u00e0 succ\u00e8s figure donc en t\u00eate de notre classement\u00a02023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques. Cette \u00e9tude annuelle r\u00e9v\u00e8le quelles recherches de c\u00e9l\u00e9brit\u00e9s renvoient le plus souvent \u00e0 des logiciels malveillants et \u00e0 des sites \u00e0 risque. Cette ann\u00e9e, nous avons modifi\u00e9 notre classement, qui inclut d\u00e9sormais les c\u00e9l\u00e9brit\u00e9s identifi\u00e9es dans des deepfakes et d&#8217;autres contenus pilot\u00e9s par l&#8217;IA.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Compte tenu de la notori\u00e9t\u00e9 de Ryan Gosling cette ann\u00e9e, il n&#8217;est pas surprenant qu&#8217;il soit si bien class\u00e9. <\/span><span data-contrast=\"none\">Comme <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/scammers-love-barbie-fake-videos-promote-bogus-ticket-offers-that-steal-personal-info\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">nous l&#8217;avons mentionn\u00e9 plus t\u00f4t cette ann\u00e9e<\/span><\/a><span data-contrast=\"none\">, Barbie a \u00e9galement \u00e9t\u00e9 un grand succ\u00e8s pour les cybercriminels. Ils ont app\u00e2t\u00e9 les consommateurs avec une s\u00e9rie d&#8217;escroqueries sur les tickets de cin\u00e9ma, de t\u00e9l\u00e9chargements frauduleux et d&#8217;autres attaques qui profitaient de l&#8217;engouement suscit\u00e9 par ce blockbuster estival.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<h2><b><span data-contrast=\"none\">Qui figure dans le classement des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques\u00a0?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/h2>\n<p><span data-contrast=\"none\">Plusieurs mois apr\u00e8s la sortie de Barbie, les recherches concernant Ryan Gosling restent nombreuses. Son interpr\u00e9tation de Ken lui a valu d&#8217;entrer au Billboard\u00a0Hot\u00a0100 pour la toute premi\u00e8re fois avec la chanson \u00ab\u00a0I&#8217;m Just Ken\u00a0\u00bb. Par ailleurs, les <\/span><a href=\"https:\/\/www.billboard.com\/culture\/product-recommendations\/most-popular-halloween-costumes-buy-online-1235159302\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">costumes de Ken et de Barbie<\/span><\/a><span data-contrast=\"none\"> comptent parmi les d\u00e9guisements d&#8217;Halloween les plus populaires en\u00a02023.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Et si vous vous posez la question, Margot Robbie, qui a jou\u00e9 le r\u00f4le de Barbie, occupe la huiti\u00e8me place de notre classement. Voici les dix c\u00e9l\u00e9brit\u00e9s en t\u00eate de liste\u00a0:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"none\">Ryan Gosling<\/span><\/b><span data-contrast=\"none\">, laur\u00e9at d&#8217;un Golden\u00a0Globe et nomm\u00e9 plusieurs fois aux Oscars\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Emily Blunt<\/span><\/b><span data-contrast=\"none\">, actrice acclam\u00e9e par la critique et star du film \u00e0 succ\u00e8s Oppenheimer sorti cet \u00e9t\u00e9<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Jennifer Lopez<\/span><\/b><span data-contrast=\"none\">, ic\u00f4ne de la culture pop, chanteuse, actrice et productrice acclam\u00e9e par la critique<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Zendaya<\/span><\/b><span data-contrast=\"none\">, actrice et chanteuse acclam\u00e9e par la critique\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Kevin Costner<\/span><\/b><span data-contrast=\"none\">, acteur et r\u00e9alisateur laur\u00e9at de deux Oscars, et star actuelle de la s\u00e9rie \u00e0 succ\u00e8s Yellowstone<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Elon Musk<\/span><\/b><span data-contrast=\"none\">, magnat des affaires et entrepreneur dans la technologie\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Al Roker<\/span><\/b><span data-contrast=\"none\">, c\u00e9l\u00e8bre m\u00e9t\u00e9orologue de l&#8217;\u00e9mission Today, auteur et journaliste\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Margot Robbie<\/span><\/b><span data-contrast=\"none\">, actrice et productrice nomm\u00e9e \u00e0 plusieurs reprises aux Oscars et aux BAFTA\u00a0Awards, et star du blockbuster estival Barbie<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">Bad Bunny<\/span><\/b><span data-contrast=\"none\">, rappeur aux multiples disques de platine et premier chanteur non anglophone \u00e0 \u00eatre sacr\u00e9 artiste le plus \u00e9cout\u00e9 de l&#8217;ann\u00e9e par Spotify\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<li><b><span data-contrast=\"none\">America Ferrera<\/span><\/b><span data-contrast=\"none\">, actrice et second r\u00f4le dans le film Barbie<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<\/ol>\n<h2><b><span data-contrast=\"none\">Ce que vous risquez lorsque vous effectuez des recherches sur ces c\u00e9l\u00e9brit\u00e9s<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Les pirates informatiques \u00e0 l&#8217;origine de ces attaques exploitant des c\u00e9l\u00e9brit\u00e9s ont deux objectifs principaux\u00a0:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Ils souhaitent que vous leur divulguiez des informations personnelles qu&#8217;ils pourront utiliser pour commettre des fraudes et des vols d&#8217;identit\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Ils veulent infecter votre appareil avec des logiciels malveillants. Il peut s&#8217;agir d&#8217;un logiciel espion qui vole des informations personnelles ou d&#8217;un ransomware qui prend votre appareil et ses fichiers en otage en vous promettant de les d\u00e9bloquer moyennant une ran\u00e7on.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">Les cybercriminels associent ainsi des noms de c\u00e9l\u00e9brit\u00e9s \u00e0 des termes tels que <\/span><i><span data-contrast=\"none\">livre audio<\/span><\/i><span data-contrast=\"none\">, <\/span><i><span data-contrast=\"none\">paroles<\/span><\/i><span data-contrast=\"none\">, <\/span><i><span data-contrast=\"none\">deepfake<\/span><\/i><span data-contrast=\"none\">, <\/span><i><span data-contrast=\"none\">sonnerie gratuite<\/span><\/i><span data-contrast=\"none\">, <\/span><i><span data-contrast=\"none\">film gratuit<\/span><\/i><span data-contrast=\"none\">, <\/span><i><span data-contrast=\"none\">t\u00e9l\u00e9chargement gratuit<\/span><\/i><span data-contrast=\"none\"> et <\/span><i><span data-contrast=\"none\">MP4<\/span><\/i><span data-contrast=\"none\">, qui g\u00e9n\u00e8rent des r\u00e9sultats menant \u00e0 des sites douteux.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Ils ciblent les personnes qui souhaitent t\u00e9l\u00e9charger quelque chose ou acc\u00e9der \u00e0 un contenu quelconque concernant une c\u00e9l\u00e9brit\u00e9. Souvenez-vous des escroqueries li\u00e9es au film Barbie observ\u00e9es cette ann\u00e9e, qui proposaient des t\u00e9l\u00e9chargements gratuits du film. Il s&#8217;agissait bien s\u00fbr de logiciels malveillants et d&#8217;escroqueries en vue de commettre des vols d&#8217;identit\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Le simple fait de rechercher le nom d&#8217;une c\u00e9l\u00e9brit\u00e9 n&#8217;aboutit pas n\u00e9cessairement \u00e0 une liste de r\u00e9sultats suspects. Notre directeur technique, Steve Grobman, d\u00e9crit bien les risques encourus\u00a0: <em>\u00ab\u00a0Nous savons que les gens recherchent des contenus gratuits, comme des films en t\u00e9l\u00e9chargement, ce qui les met en danger. Si quelque chose semble trop beau pour \u00eatre vrai, c&#8217;est g\u00e9n\u00e9ralement le cas<\/em><\/span><em> et cela m\u00e9rite un examen plus approfondi<\/em><span data-contrast=\"none\"><em>\u00a0\u00bb.<\/em> Les pirates informatiques savent \u00e0 quel point les consommateurs sont avides de contenus sur les c\u00e9l\u00e9brit\u00e9s et, malheureusement, certaines personnes cliquent sur des liens qui promettent ce type de contenus, malgr\u00e9 les risques associ\u00e9s.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<h2><b><span data-contrast=\"none\">Qui d&#8217;autre figure dans le <\/span><\/b><b><span data-contrast=\"none\">classement des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques<\/span><\/b><b><span data-contrast=\"none\">\u00a0?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Plusieurs grands noms du sport et de la culture populaire compl\u00e8tent le classement.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Le joueur de football argentin Lionel Messi, qui a r\u00e9cemment rejoint la Major League Soccer de Miami, arrive en 18e\u00a0position. Tom Brady, consid\u00e9r\u00e9 comme le plus grand joueur de football am\u00e9ricain de tous les temps, aujourd&#8217;hui retrait\u00e9, se classe au 19e\u00a0rang, <\/span><span data-contrast=\"none\">tandis que <\/span><span data-contrast=\"none\">Travis Kelce<\/span><span data-contrast=\"none\">, <\/span><span data-contrast=\"none\">tight end (receveur rapproch\u00e9)<\/span> pour la franchise de <span data-contrast=\"none\">football am\u00e9ricain<\/span><span data-contrast=\"none\"> des <\/span><span data-contrast=\"none\">Chiefs de Kansas City<\/span><span data-contrast=\"none\">, a<\/span><span data-contrast=\"none\">rrive<\/span><span data-contrast=\"none\"> en 22e\u00a0position.<\/span> <span data-contrast=\"none\">Steph Curry, star de la NBA, occupe la 2<\/span><span data-contrast=\"none\">3e\u00a0place, t<\/span><span data-contrast=\"none\">andis qu&#8217;<\/span><span data-contrast=\"none\">Aaron Rogers, une autre l\u00e9gende du football am\u00e9ricain, se classe au 3<\/span><span data-contrast=\"none\">1e\u00a0rang<\/span><span data-contrast=\"none\">. Serena Willia<\/span><span data-contrast=\"none\">ms<\/span><span data-contrast=\"none\">, force dominante sur le terrain et dans la culture, arrive en 3<\/span><span data-contrast=\"none\">2e\u00a0position<\/span><span data-contrast=\"none\">. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Des personnalit\u00e9s de la t\u00e9l\u00e9r\u00e9alit\u00e9 et de la culture pop figurent \u00e9galement dans le top\u00a050, avec Andy Cohen de l&#8217;\u00e9mission Real Housewives \u00e0 la 11e\u00a0place, suivi de Kim Kardashian \u00e0 la 2<\/span><span data-contrast=\"none\">4<\/span><span data-contrast=\"none\">e\u00a0place et de Tom Sandoval \u00e0 la <\/span><span data-contrast=\"none\">40<\/span><span data-contrast=\"none\">e\u00a0place.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Et pour les Swifties parmi vous, Taylor Swift s&#8217;est hiss\u00e9e \u00e0 la 25e\u00a0position de notre classement\u00a02023.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<h2><b><span data-contrast=\"none\">Les escroqueries bas\u00e9es sur l&#8217;IA connaissent elles aussi leur heure de gloire<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/h2>\n<p><span data-contrast=\"none\">Gr\u00e2ce aux outils d&#8217;IA facilement accessibles, les cybercriminels ont augment\u00e9 \u00e0 la fois la sophistication et le volume de leurs attaques. Il en va de m\u00eame pour les attaques exploitant des c\u00e9l\u00e9brit\u00e9s.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Selon les chercheurs de McAfee, les deepfakes font partie des tendances en hausse g\u00e9n\u00e9r\u00e9es par l&#8217;IA. Prenons l&#8217;exemple d&#8217;Elon Musk. Il figure en sixi\u00e8me place de notre classement, et nos chercheurs ont observ\u00e9 un volume important de contenus malveillants de type deepfake associ\u00e9s \u00e0 son nom, souvent dans le cadre d&#8217;escroqueries \u00e0 la cryptomonnaie.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">En prenant un \u00e9chantillon parmi le top\u00a050 du classement, les chercheurs de McAfee ont d\u00e9couvert entre 25 et 135\u00a0URL de deepfake par recherche de c\u00e9l\u00e9brit\u00e9.<\/span> <span data-contrast=\"none\">Bien qu&#8217;il existe des cas de deepfakes malveillants, bon nombre des deepfakes concernant des c\u00e9l\u00e9brit\u00e9s sont actuellement utilis\u00e9s \u00e0 des fins r\u00e9cr\u00e9atives ou de publicit\u00e9 mensong\u00e8re. Cependant, de plus en plus d&#8217;indices montrent que les futurs deepfakes pourraient devenir trompeurs, c&#8217;est-\u00e0-dire transmettre d\u00e9lib\u00e9r\u00e9ment de fausses informations au nom d&#8217;une personnalit\u00e9 publique.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<h2><b><span data-contrast=\"none\">Restez en s\u00e9curit\u00e9 lorsque vous effectuez des recherches sur des c\u00e9l\u00e9brit\u00e9s\u00a0\u2014 et le reste du temps<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/h2>\n<p><span data-contrast=\"none\">Vous avez toutes les raisons et tous les droits de faire des recherches et d&#8217;appr\u00e9cier des contenus sur vos c\u00e9l\u00e9brit\u00e9s pr\u00e9f\u00e9r\u00e9es en toute s\u00e9curit\u00e9. La combinaison d&#8217;un \u0153il attentif et d&#8217;une protection en ligne peut vous permettre de rester en s\u00e9curit\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Privil\u00e9giez les sources et les sites Web dans lesquels vous avez confiance.<\/span><\/b><span data-contrast=\"none\"> Lorsque vous souhaitez vous informer sur des c\u00e9l\u00e9brit\u00e9s, recherchez des noms que vous connaissez, c&#8217;est-\u00e0-dire des sources fiables qui existent depuis longtemps. Il n&#8217;est pas difficile pour les pirates informatiques et les escrocs de cr\u00e9er rapidement leurs propres sites frauduleux d&#8217;informations sur les c\u00e9l\u00e9brit\u00e9s. C&#8217;est m\u00eame plut\u00f4t facile, notamment gr\u00e2ce \u00e0 l&#8217;IA qui peut g\u00e9n\u00e9rer de faux articles d&#8217;apparence authentique.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0 <\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Tenez-vous-en aux services de streaming et de t\u00e9l\u00e9chargement l\u00e9gitimes.<\/span><\/b><span data-contrast=\"none\"> Que vous souhaitiez \u00e9couter le dernier album de Taylor Swift (Taylor\u2019s version, bien s\u00fbr) ou visionner les films de vos stars pr\u00e9f\u00e9r\u00e9es, utilisez des services connus et l\u00e9gitimes. C&#8217;est vrai, il vous faudra parfois payer ou supporter quelques publicit\u00e9s. Mais les solutions ill\u00e9gales peuvent \u00eatre truff\u00e9es de logiciels malveillants ou demander des informations personnelles qui finissent par tomber entre les mains de pirates informatiques.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0 <\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Ne fournissez pas d&#8217;identifiants de connexion ou d&#8217;autres <\/span><\/b><b><span data-contrast=\"none\">informations<\/span><\/b><b><span data-contrast=\"auto\">.<\/span><\/b><span data-contrast=\"auto\"> Si vous recevez un message, un SMS ou un e-mail, ou si vous visitez un site Web tiers qui vous demande des informations telles que votre carte de cr\u00e9dit, votre adresse e-mail, votre adresse postale ou d&#8217;autres donn\u00e9es de connexion, ne les divulguez pas, en particulier si l&#8217;on vous promet <\/span><span data-contrast=\"auto\"> des contenus \u00ab\u00a0exclusifs\u00a0\u00bb. Ce type de demande est une tactique de phishing courante qui peut conduire \u00e0 un vol d&#8217;identit\u00e9.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0 <\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Distinguez le vrai du faux gr\u00e2ce \u00e0 un logiciel de protection en ligne.<\/span><\/b> Un <a href=\"https:\/\/www.mcafee.com\/fr-fr\/index.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">logiciel de protection en ligne complet<\/span><\/a><span data-contrast=\"none\"> peut tenir \u00e0 distance les escroqueries exploitant des c\u00e9l\u00e9brit\u00e9s et autres arnaques de ce type. Premi\u00e8rement, notre nouvelle protection anti-escroquerie McAfee utilise l&#8217;IA intelligente pour d\u00e9tecter les SMS et les liens qui vous sont envoy\u00e9s par des escrocs et vous en avertir, afin que vous puissiez distinguer le vrai du faux. Deuxi\u00e8mement, la protection Web assure votre s\u00e9curit\u00e9 lors de vos recherches\u00a0: elle identifie les liens malveillants et les bloque si vous cliquez accidentellement sur l&#8217;un d&#8217;entre eux. Tout cela fait partie de la protection compl\u00e8te des appareils, des identit\u00e9s et de la vie priv\u00e9e que nous vous proposons.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0 <\/span><\/li>\n<\/ul>\n<h2><b><span data-contrast=\"none\">Qu&#8217;il s&#8217;agisse de Ryan Gosling, de J-Lo ou de Bad Bunny, vous pouvez effectuer vos recherches en toute s\u00e9curit\u00e9<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Les pirates informatiques et les escrocs adorent profiter de la notori\u00e9t\u00e9 des c\u00e9l\u00e9brit\u00e9s. En d\u00e9tournant de grands noms comme ceux de Ryan Gosling, J-Lo et Bad Bunny, ils trompent de nombreux fans bien intentionn\u00e9s en les incitant \u00e0 t\u00e9l\u00e9charger des logiciels malveillants ou \u00e0 divulguer leurs donn\u00e9es personnelles.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0 <\/span><\/p>\n<p><span data-contrast=\"none\">Bien s\u00fbr, ce n&#8217;est pas une raison pour arr\u00eater de vous informer sur ces c\u00e9l\u00e9brit\u00e9s. Bien au contraire. Profitez de vos s\u00e9ries, de vos \u00e9missions, de votre musique et de vos films, ainsi que des actualit\u00e9s et des potins qui les entourent. Ne vous en privez pas. Faites preuve de vigilance et utilisez une protection ad\u00e9quate qui assure vos arri\u00e8res.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span> <iframe id=\"__caac__clientPolicyIframeId\" style=\"display: none;\" src=\"https:\/\/mcas-proxyweb\/client-side-top-domain?top=0&amp;domain=www.mcafee.com.mcas.ms&amp;version=3\"><\/iframe> <iframe id=\"__caac__clientPolicyIframeId\" style=\"display: none;\" src=\"https:\/\/mcas-proxyweb\/client-side-top-domain?top=0&amp;domain=www.mcafee.com.mcas.ms&amp;version=3\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n&#8217;importe quelle autre c\u00e9l\u00e9brit\u00e9&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":175730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11941],"tags":[],"coauthors":[16287,15741],"class_list":["post-176254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n&#039;importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n&#039;importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-08T11:51:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-08T12:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques\",\"datePublished\":\"2023-11-08T11:51:41+00:00\",\"dateModified\":\"2023-11-08T12:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\"},\"wordCount\":1841,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png\",\"articleSection\":[\"S\u00e9curit\u00e9 Internet\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\",\"name\":\"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png\",\"datePublished\":\"2023-11-08T11:51:41+00:00\",\"dateModified\":\"2023-11-08T12:30:00+00:00\",\"description\":\"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n'importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee","description":"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n'importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee","og_description":"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n'importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-11-08T11:51:41+00:00","article_modified_time":"2023-11-08T12:30:00+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png","type":"image\/png"}],"author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques","datePublished":"2023-11-08T11:51:41+00:00","dateModified":"2023-11-08T12:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/"},"wordCount":1841,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png","articleSection":["S\u00e9curit\u00e9 Internet"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/","name":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png","datePublished":"2023-11-08T11:51:41+00:00","dateModified":"2023-11-08T12:30:00+00:00","description":"Les pirates informatiques adorent Ryan Gosling. En effet, ils utilisent son nom plus que celui de n'importe quelle autre c\u00e9l\u00e9brit\u00e9 comme app\u00e2t.\u00a0 La star","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/10\/300x200_Blog_Hacker-List.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/mcafee-2023-hacker-celebrity-hot-list\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 Internet","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Classement McAfee 2023 des c\u00e9l\u00e9brit\u00e9s les plus exploit\u00e9es par les pirates informatiques"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/176254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=176254"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/176254\/revisions"}],"predecessor-version":[{"id":176258,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/176254\/revisions\/176258"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media\/175730"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=176254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=176254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=176254"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=176254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}