{"id":226476,"date":"2026-02-04T06:28:13","date_gmt":"2026-02-04T14:28:13","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=226476"},"modified":"2026-02-04T06:28:13","modified_gmt":"2026-02-04T14:28:13","slug":"escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/","title":{"rendered":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub"},"content":{"rendered":"<p><span data-contrast=\"auto\">Cette semaine, trois gros titres racontent la m\u00eame histoire\u00a0: les cybercriminels s&#8217;am\u00e9liorent dans la manipulation des personnes et ne se contentent pas d&#8217;infiltrer des syst\u00e8mes.\u00a0Nous assistons \u00e0 une vague d&#8217;intrusions li\u00e9es \u00e0 l&#8217;ing\u00e9nierie sociale, \u00e0 la confirmation d&#8217;une violation par une importante plateforme de livraison dans un contexte d&#8217;extorsion, ainsi qu&#8217;\u00e0 un gros titre technologique qui am\u00e8ne de nombreuses personnes \u00e0 repenser la mani\u00e8re dont les applications traitent leurs donn\u00e9es.<\/span><\/p>\n<p><span data-contrast=\"auto\">Chaque semaine, ce r\u00e9capitulatif analyse les actualit\u00e9s li\u00e9es aux escroqueries et \u00e0 la cybers\u00e9curit\u00e9 et explique comment elles fonctionnent r\u00e9ellement, afin que vous puissiez rep\u00e9rer les risques plus t\u00f4t et \u00e9viter de vous laisser pi\u00e9ger.<\/span><\/p>\n<p><span data-contrast=\"auto\">Entrons dans le vif du sujet.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Une vague de cyberattaques frappe Bumble, Match, Panera et CrunchBase<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">En bref\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">plusieurs grandes marques ont \u00e9t\u00e9 touch\u00e9es par des incidents de cybers\u00e9curit\u00e9 li\u00e9s \u00e0 des tactiques d&#8217;ing\u00e9nierie sociale telles que le phishing et le vishing.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Les faits\u00a0:\u00a0<\/span><\/b><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-01-28\/bumble-panera-bread-crunchbase-match-hit-by-cyberattacks?srnd=phx-technology&amp;embedded-checkout=true\"><span data-contrast=\"none\">Bloomberg a rapport\u00e9<\/span><\/a><span data-contrast=\"auto\"> que Bumble, Match Group, Panera Bread et CrunchBase ont chacun confirm\u00e9 des incidents.<\/span><\/p>\n<p><span data-contrast=\"auto\">Bumble a d\u00e9clar\u00e9 qu&#8217;un compte de prestataire avait \u00e9t\u00e9 compromis lors d&#8217;un incident de phishing, ce qui a conduit \u00e0 un bref acc\u00e8s non autoris\u00e9 \u00e0 une petite partie de son r\u00e9seau, et a pr\u00e9cis\u00e9 que sa base de donn\u00e9es de membres, leurs comptes, leurs messages et leurs profils n&#8217;ont pas \u00e9t\u00e9 consult\u00e9s.<\/span><\/p>\n<p><span data-contrast=\"auto\">Panera a expliqu\u00e9 qu&#8217;un cyberpirate avait acc\u00e9d\u00e9 \u00e0 une application logicielle qu&#8217;il utilisait pour stocker des donn\u00e9es, et que les donn\u00e9es concern\u00e9es \u00e9taient des informations de contact.<\/span><\/p>\n<p><span data-contrast=\"auto\">Match a pr\u00e9cis\u00e9 que l&#8217;incident n&#8217;avait affect\u00e9 qu&#8217;une quantit\u00e9 limit\u00e9e de donn\u00e9es utilisateurs et que rien n&#8217;indiquait que des identifiants utilisateurs, des informations financi\u00e8res ou des communications priv\u00e9es avaient \u00e9t\u00e9 consult\u00e9s.<\/span><\/p>\n<p><span data-contrast=\"auto\">CrunchBase a indiqu\u00e9 que des documents de son r\u00e9seau d&#8217;entreprise avaient \u00e9t\u00e9 touch\u00e9s et a d\u00e9clar\u00e9 avoir ma\u00eetris\u00e9 l&#8217;incident.<\/span><\/p>\n<p><span data-contrast=\"auto\">Selon Bloomberg, la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Mandiant a \u00e9galement mis en garde contre une campagne de piratage li\u00e9e \u00e0 un groupe qui se fait appeler ShinyHunters. Le groupe utilise le <\/span><b><span data-contrast=\"auto\">\u00ab\u00a0vishing\u00a0\u00bb, c&#8217;est-\u00e0-dire des appels t\u00e9l\u00e9phoniques frauduleux<\/span><\/b><span data-contrast=\"auto\">,\u00a0<\/span><b><span data-contrast=\"auto\">pour inciter les gens \u00e0 divulguer leurs informations de connexion.<\/span><\/b><span data-contrast=\"auto\">\u00a0Une fois que les cybercriminels ont mis la main sur ces identifiants, ils peuvent acc\u00e9der aux outils dans le cloud et aux syst\u00e8mes de travail en ligne que les entreprises utilisent tous les jours. Le groupe a d\u00e9clar\u00e9 \u00eatre \u00e0 l&#8217;origine de certaines de ces attaques r\u00e9centes, mais cette information n&#8217;a pas \u00e9t\u00e9 confirm\u00e9e de mani\u00e8re ind\u00e9pendante.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Les signaux d&#8217;alerte \u00e0 surveiller\u00a0:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Appels vous incitant \u00e0 approuver une connexion, \u00e0 r\u00e9initialiser des identifiants ou \u00e0 partager un code \u00e0 usage unique<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Messages se faisant passer pour le support informatique, un fournisseur ou la \u00ab\u00a0s\u00e9curit\u00e9\u00a0\u00bb et vous mettant la pression<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Demandes d&#8217;authentification multifacteur dont vous n&#8217;\u00eates pas \u00e0 l&#8217;origine<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Demandes de \u00ab\u00a0v\u00e9rification rapide\u00a0\u00bb qui contournent les proc\u00e9dures internes normales<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Fonctionnement\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">l&#8217;ing\u00e9nierie sociale fonctionne parce qu&#8217;elle s&#8217;int\u00e8gre \u00e0 la vie normale. Un message ou un appel convaincant pousse quelqu&#8217;un \u00e0 faire quelque chose de \u00ab\u00a0raisonnable\u00a0\u00bb\u00a0: approuver un message, lire un code, r\u00e9initialiser un acc\u00e8s, etc. C&#8217;est souvent tout ce dont un cyberpirate a besoin pour s&#8217;infiltrer avec des identifiants l\u00e9gitimes, puis pivoter vers les outils o\u00f9 se trouvent des donn\u00e9es pr\u00e9cieuses.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<div class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"wpa-warning wpa-image-missing-alt aligncenter size-full wp-image-216406\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg\" alt=\"\" width=\"1000\" height=\"679\" data-warning=\"Missing alt text\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-300x204.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-768x521.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/07\/shutterstock_2456411447-190x129.jpg 190w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/div>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">La mise \u00e0 jour de la politique de confidentialit\u00e9 de TikTok suscite des r\u00e9actions n\u00e9gatives<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Nous savons que cette rubrique s&#8217;appelle \u00ab\u00a0Les escroqueries de la semaine\u00a0\u00bb, mais il s&#8217;agit aussi d&#8217;une lettre d&#8217;information sur la cybers\u00e9curit\u00e9.\u00a0Alors quand le plus gros titre de la semaine en mati\u00e8re de technologie et de protection de la vie priv\u00e9e concerne la mise \u00e0 jour par TikTok de sa politique de confidentialit\u00e9, nous nous devons d&#8217;en parler.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">En bref\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">la mise \u00e0 jour des conditions et de la politique de confidentialit\u00e9 de TikTok soul\u00e8ve de nouvelles questions sur les donn\u00e9es collect\u00e9es, notamment en mati\u00e8re de localisation.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Les faits\u00a0:<\/span><\/b><span data-contrast=\"auto\"> TikTok a confirm\u00e9 la semaine derni\u00e8re qu&#8217;une nouvelle entit\u00e9 bas\u00e9e aux \u00c9tats-Unis contr\u00f4lait l&#8217;application apr\u00e8s s&#8217;\u00eatre s\u00e9par\u00e9e de ByteDance au d\u00e9but de l&#8217;ann\u00e9e. Le m\u00eame jour, <\/span><a href=\"https:\/\/www.cbsnews.com\/news\/tiktok-new-terms-of-service-privacy-geolocation-personal-information\/\"><span data-contrast=\"none\">CBS a rapport\u00e9 que TikTok avait publi\u00e9 des conditions mises \u00e0 jour et une nouvelle politique de confidentialit\u00e9<\/span><\/a><span data-contrast=\"auto\">, ce qui a suscit\u00e9 des r\u00e9actions n\u00e9gatives sur les r\u00e9seaux sociaux.<\/span><\/p>\n<p><span data-contrast=\"auto\">Selon CBS, l&#8217;un des principaux sujets de pr\u00e9occupation r\u00e9side dans des formulations selon lesquelles TikTok peut collecter des informations de localisation pr\u00e9cises si les utilisateurs activent les services de localisation dans les param\u00e8tres de l&#8217;appareil.\u00a0Il s&#8217;agit apparemment d&#8217;un changement par rapport \u00e0 la politique pr\u00e9c\u00e9dente, et TikTok a d\u00e9clar\u00e9 qu&#8217;il pr\u00e9voyait d&#8217;offrir aux utilisateurs am\u00e9ricains la possibilit\u00e9 d&#8217;accepter ou de refuser les fonctionnalit\u00e9s de localisation pr\u00e9cise lors de leur d\u00e9ploiement.<\/span><\/p>\n<p><span data-contrast=\"auto\">Selon CBS, certains utilisateurs craignent \u00e9galement que la nouvelle politique de confidentialit\u00e9 permette \u00e0 TikTok de partager plus facilement leurs donn\u00e9es priv\u00e9es avec le gouvernement f\u00e9d\u00e9ral et local.<\/span><\/p>\n<p><span data-contrast=\"auto\">Cette crainte est fond\u00e9e sur un changement dans les dispositions de la politique, qui stipulent que TikTok \u00ab\u00a0traite ces informations personnelles sensibles conform\u00e9ment \u00e0 la l\u00e9gislation applicable\u00a0\u00bb.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Conclusion rapide et pratique\u00a0: <\/span><\/b><span data-contrast=\"auto\">il s&#8217;agit d&#8217;un bon rappel que les pr\u00e9occupations li\u00e9es aux politiques de confidentialit\u00e9 peuvent g\u00e9n\u00e9ralement <\/span><b><span data-contrast=\"auto\">\u00eatre r\u00e9solues en contr\u00f4lant les autorisations de votre application.<\/span><\/b><\/p>\n<p><b><span data-contrast=\"auto\">Mesures g\u00e9n\u00e9rales de protection de la vie priv\u00e9e\u00a0:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Consultez les param\u00e8tres de votre t\u00e9l\u00e9phone pour TikTok et v\u00e9rifiez si l&#8217;acc\u00e8s \u00e0 la localisation est r\u00e9gl\u00e9 sur D\u00e9sactiv\u00e9, En cours d&#8217;utilisation ou Toujours.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Si votre appareil le permet, envisagez de d\u00e9sactiver la localisation pr\u00e9cise pour les applications qui n&#8217;en ont pas vraiment besoin.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Parcourez rapidement les autorisations des applications de r\u00e9seaux sociaux\u00a0: localisation, contacts, photos, microphone, appareil photo et Bluetooth.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Assurez-vous que votre compte est prot\u00e9g\u00e9 par un mot de passe fort et unique et par l&#8217;authentification \u00e0 deux facteurs.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Remarque\u00a0: il ne s&#8217;agit pas d&#8217;une recommandation concernant la conservation ou la suppression d&#8217;une application sp\u00e9cifique, mais de vous rappeler que les param\u00e8tres de votre appareil sont importants et qu&#8217;ils m\u00e9ritent d&#8217;\u00eatre v\u00e9rifi\u00e9s.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Grubhub confirme une violation de donn\u00e9es dans un contexte d&#8217;extorsion<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">En bref\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">m\u00eame si une entreprise affirme que les donn\u00e9es de paiement n&#8217;ont pas \u00e9t\u00e9 affect\u00e9es, une violation peut toujours engendrer des risques, car les donn\u00e9es vol\u00e9es sont souvent r\u00e9utilis\u00e9es \u00e0 des fins de phishing.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Les faits\u00a0:<\/span><\/b><span data-contrast=\"auto\"> selon <\/span><a href=\"https:\/\/www.google.com\/search?q=bleeping+computer+grub+hub&amp;oq=bleeping+computer+grub+hub&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIJCAEQIRgKGKABMgkIAhAhGAoYoAEyCQgDECEYChigATIJCAQQIRgKGKABMgYIBRAhGAoyBwgGECEYjwIyBwgHECEYjwLSAQgyODAyajBqN6gCALACAA&amp;sourceid=chrome&amp;ie=UTF-8\"><span data-contrast=\"none\">BleepingComputer<\/span><\/a><span data-contrast=\"auto\">, Grubhub a confirm\u00e9 que des personnes non autoris\u00e9es ont t\u00e9l\u00e9charg\u00e9 des donn\u00e9es \u00e0 partir de certains syst\u00e8mes et qu&#8217;il a enqu\u00eat\u00e9, mis fin \u00e0 l&#8217;activit\u00e9 et pris des mesures pour renforcer la s\u00e9curit\u00e9. Des sources ont indiqu\u00e9 \u00e0 BleepingComputer que l&#8217;entreprise fait face \u00e0 des demandes d&#8217;extorsion li\u00e9es aux donn\u00e9es vol\u00e9es. Grubhub a d\u00e9clar\u00e9 que les informations sensibles telles que les donn\u00e9es financi\u00e8res et l&#8217;historique des commandes n&#8217;ont pas \u00e9t\u00e9 affect\u00e9es, et n&#8217;a pas fourni plus de d\u00e9tails sur le timing ou l&#8217;envergure.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Signaux d&#8217;alerte \u00e0 surveiller\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">les gros titres sur les violations sont souvent suivis de vagues d&#8217;escroqueries. M\u00e9fiez-vous de ce qui suit\u00a0:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">E-mails \u00e9voquant un \u00ab\u00a0remboursement\u00a0\u00bb ou un \u00ab\u00a0probl\u00e8me de commande\u00a0\u00bb que vous n&#8217;avez pas demand\u00e9s<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Faux messages du support client vous demandant de v\u00e9rifier les informations de votre compte<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Invitations \u00e0 r\u00e9initialiser un mot de passe dont vous n&#8217;\u00eates pas \u00e0 l&#8217;origine<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Liens pour \u00ab\u00a0r\u00e9soudre votre compte\u00a0\u00bb qui ne proviennent pas d&#8217;un domaine connu et officiel<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Fonctionnement\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">les syst\u00e8mes de support client peuvent contenir des d\u00e9tails personnels qui donnent \u00e0 l&#8217;escroquerie une apparence convaincante. Les noms, les e-mails et les notes de compte suffisent souvent aux cybercriminels pour r\u00e9diger des messages qui ressemblent \u00e0 une aide l\u00e9gitime, en particulier lorsque la marque fait d\u00e9j\u00e0 parler d&#8217;elle.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-208738\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg\" alt=\"Onglet de recherche Google sur un ordinateur portable\" width=\"1000\" height=\"668\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-768x513.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/google_ai_scam_Banner-193x129.jpg 193w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">De fausses extensions Chrome prennent discr\u00e8tement le contr\u00f4le de comptes<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">En bref\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">certaines extensions de navigateur qui ressemblent \u00e0 des outils de travail normaux sont en fait con\u00e7ues pour d\u00e9tourner des comptes et emp\u00eacher les utilisateurs d&#8217;acc\u00e9der \u00e0 leurs propres contr\u00f4les de s\u00e9curit\u00e9.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Les faits\u00a0:<\/span><\/b><span data-contrast=\"auto\">\u00a0des chercheurs en s\u00e9curit\u00e9 <\/span><a href=\"https:\/\/www.foxnews.com\/tech\/malicious-google-chrome-extensions-hijack-accounts\"><span data-contrast=\"none\">ont d\u00e9clar\u00e9 \u00e0 Fox News<\/span><\/a><span data-contrast=\"auto\"> qu&#8217;ils avaient d\u00e9couvert une campagne impliquant des extensions Google Chrome malveillantes qui se font passer pour des plateformes commerciales et de ressources humaines bien connues, y compris des outils couramment utilis\u00e9s pour la paie, les avantages et l&#8217;acc\u00e8s au lieu de travail.<\/span><\/p>\n<p><span data-contrast=\"auto\">Les chercheurs ont identifi\u00e9 plusieurs fausses extensions pr\u00e9sent\u00e9es comme des outils de productivit\u00e9 ou de s\u00e9curit\u00e9. Une fois install\u00e9es, elles fonctionnent discr\u00e8tement en arri\u00e8re-plan, sans signes d&#8217;alerte apparents. Selon Fox News, Google a d\u00e9clar\u00e9 que les extensions avaient \u00e9t\u00e9 supprim\u00e9es du Chrome Web Store, mais que certaines circulaient encore sur des sites de t\u00e9l\u00e9chargement tiers.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Fonctionnement\u00a0:<\/span><\/b><span data-contrast=\"auto\"> au lieu de voler les mots de passe directement, les extensions capturaient les sessions de connexion actives. Lorsque vous vous connectez \u00e0 un site Web, votre navigateur stocke de petits fichiers qui vous permettent de rester connect\u00e9. Si des cybercriminels acc\u00e8dent \u00e0 ces fichiers, ils peuvent infiltrer un compte sans jamais conna\u00eetre le mot de passe associ\u00e9.<\/span><\/p>\n<p><span data-contrast=\"auto\">Certaines extensions sont all\u00e9es plus loin en interf\u00e9rant avec les param\u00e8tres de s\u00e9curit\u00e9. Les victimes ne pouvaient pas modifier leurs mots de passe, consulter l&#8217;historique de leurs connexions ni acc\u00e9der aux contr\u00f4les de leurs comptes. Il est donc plus difficile de d\u00e9tecter l&#8217;intrusion et encore plus complexe de r\u00e9tablir l&#8217;acc\u00e8s une fois que l&#8217;on a senti que quelque chose n&#8217;allait pas.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Pourquoi c&#8217;est important\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">ce type d&#8217;attaque supprime le filet de s\u00e9curit\u00e9 sur lequel les gens comptent lorsque leurs comptes sont compromis. La r\u00e9initialisation des mots de passe et l&#8217;authentification \u00e0 deux facteurs ne sont utiles que si vous pouvez les atteindre. En coupant l&#8217;acc\u00e8s \u00e0 ces outils, les cyberpirates peuvent garder le contr\u00f4le plus longtemps et se d\u00e9placer dans les syst\u00e8mes connect\u00e9s avec moins de r\u00e9sistance.<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Ce dont vous devez vous m\u00e9fier\u00a0:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Extensions de navigateur que vous ne vous souvenez pas avoir install\u00e9es<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Modules compl\u00e9mentaires demand\u00e9s pour g\u00e9rer les ressources humaines, la paie ou l&#8217;acc\u00e8s interne \u00e0 l&#8217;entreprise<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Param\u00e8tres de s\u00e9curit\u00e9 manquants ou inaccessibles sur les comptes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span data-contrast=\"auto\">Connexion \u00e0 des comptes que vous n&#8217;avez pas ouverts r\u00e9cemment<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">V\u00e9rification de s\u00e9curit\u00e9 rapide\u00a0:\u00a0<\/span><\/b><span data-contrast=\"auto\">prenez quelques minutes pour passer en revue les extensions de votre navigateur. Supprimez tout ce qui ne vous est pas familier ou utile, en particulier les outils associ\u00e9s aux plateformes de travail. Les extensions ont un acc\u00e8s \u00e9tendu \u00e0 votre navigateur, ce qui signifie qu&#8217;elles m\u00e9ritent le m\u00eame examen minutieux que tout autre logiciel que vous installez.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Les conseils de s\u00e9curit\u00e9 de la semaine par McAfee<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Soyez sceptique \u00e0 l&#8217;\u00e9gard des outils \u00ab\u00a0utiles\u00a0\u00bb.<\/span><\/b><span data-contrast=\"auto\">\u00a0Les extensions de navigateur, les modules compl\u00e9mentaires de l&#8217;espace de travail et les outils de productivit\u00e9 peuvent avoir un acc\u00e8s \u00e9tendu \u00e0 vos comptes. N&#8217;installez que ce dont vous avez vraiment besoin et supprimez tout ce qui ne vous est pas familier.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Traitez les appels et les invites avec prudence.<\/span><\/b><span data-contrast=\"auto\">\u00a0Les demandes de connexion inattendues, les approbations d&#8217;authentification multifacteur ou les demandes du \u00ab\u00a0support informatique\u00a0\u00bb sont des points d&#8217;entr\u00e9e courants pour l&#8217;ing\u00e9nierie sociale. Si vous n&#8217;en \u00eates pas \u00e0 l&#8217;origine, faites une pause et v\u00e9rifiez.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">V\u00e9rifiez les autorisations des applications et du navigateur.<\/span><\/b><span data-contrast=\"auto\">\u00a0Prenez quelques minutes pour v\u00e9rifier quelles applications et extensions peuvent acc\u00e9der \u00e0 votre localisation, \u00e0 vos comptes et \u00e0 vos donn\u00e9es.\u00a0De petits changements peuvent r\u00e9duire les risques de mani\u00e8re significative.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Prot\u00e9gez d&#8217;abord vos identifiants.<\/span><\/b><span data-contrast=\"auto\">\u00a0Utilisez des mots de passe forts et uniques et activez l&#8217;authentification \u00e0 deux facteurs sur vos comptes de messagerie et professionnels. Si des cybercriminels s&#8217;emparent de votre adresse e-mail, ils peuvent r\u00e9initialiser presque tout le reste.\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/learn\/fr\/gestionnaire-de-mots-de-passe\/\"><span data-contrast=\"none\">Le gestionnaire de mots de passe de McAfee<\/span><\/a><span data-contrast=\"auto\"> peut vous aider \u00e0 cr\u00e9er et \u00e0 stocker des mots de passe uniques pour tous vos comptes.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"padding-left: 40px;\"><b><span data-contrast=\"auto\">Attendez-vous \u00e0 \u00eatre la cible d&#8217;escroqueries apr\u00e8s une m\u00e9diatisation.<\/span><\/b><span data-contrast=\"auto\">\u00a0Lorsque des violations ou des changements de politique font la une, les escrocs envoient souvent des messages de phishing qui y font r\u00e9f\u00e9rence. Un scepticisme accru dans les jours et les semaines qui suivent une m\u00e9diatisation peut permettre d&#8217;\u00e9viter des probl\u00e8mes plus importants par la suite.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette semaine, trois gros titres racontent la m\u00eame histoire\u00a0: les cybercriminels s&#8217;am\u00e9liorent dans la manipulation des personnes et ne se&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":203204,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12001,11971,11941],"tags":[],"coauthors":[16711],"class_list":["post-226476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-identity-protection","category-security-news","category-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-04T14:28:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub\",\"datePublished\":\"2026-02-04T14:28:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\"},\"wordCount\":2220,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"articleSection\":[\"Protection de l'identit\u00e9 et de la confidentialit\u00e9\",\"Actualit\u00e9s sur la s\u00e9curit\u00e9\",\"S\u00e9curit\u00e9 Internet\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\",\"name\":\"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"datePublished\":\"2026-02-04T14:28:13+00:00\",\"description\":\"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png\",\"width\":300,\"height\":200,\"caption\":\"truffe della settimana\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualit\u00e9s sur la s\u00e9curit\u00e9\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee","description":"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee","og_description":"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-02-04T14:28:13+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub","datePublished":"2026-02-04T14:28:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/"},"wordCount":2220,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","articleSection":["Protection de l'identit\u00e9 et de la confidentialit\u00e9","Actualit\u00e9s sur la s\u00e9curit\u00e9","S\u00e9curit\u00e9 Internet"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/","name":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","datePublished":"2026-02-04T14:28:13+00:00","description":"Des attaques de phishing frappent Bumble, Match, Panera et CrunchBase, Grubhub confirme une violation et TikTok modifie sa politique de confidentialit\u00e9.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/10\/300x200_Blog_102824.png","width":300,"height":200,"caption":"truffe della settimana"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/escroqueries-de-la-semaine-tiktok-hinge-bumble-grubhub\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/"},{"@type":"ListItem","position":2,"name":"Actualit\u00e9s sur la s\u00e9curit\u00e9","item":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/security-news\/"},{"@type":"ListItem","position":3,"name":"Les escroqueries de la semaine\u00a0: applications de rencontres, TikTok, Grubhub"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/226476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/comments?post=226476"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/226476\/revisions"}],"predecessor-version":[{"id":226481,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/posts\/226476\/revisions\/226481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media\/203204"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/media?parent=226476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/categories?post=226476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/tags?post=226476"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-fr\/wp-json\/wp\/v2\/coauthors?post=226476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}