{"id":258,"date":"2015-02-24T13:57:23","date_gmt":"2015-02-24T12:57:23","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=258"},"modified":"2015-02-24T13:57:23","modified_gmt":"2015-02-24T12:57:23","slug":"securite-tentative-dhameconnage-sous-le-nom-de-google","status":"publish","type":"post","link":"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google","title":{"rendered":"S\u00e9curit\u00e9: Tentative d&rsquo;hame\u00e7onnage sous le nom de Google"},"content":{"rendered":"<div id=\"gt-res-content\" class=\"almost_half_cell\">\n<div dir=\"ltr\"><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" rel=\"author\"><img loading=\"lazy\" style=\"float: right; margin-left: 10px; padding: 10px;\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013.jpg?resize=86%2C112\" alt=\"Alain Bonneaud - CGEIT\u00ae, COBIT, ITIL Expert, PRINCE2 Practitioner\" width=\"86\" height=\"112\" data-recalc-dims=\"1\" \/><\/a><br \/>\n<span class=\"hps\">Un nouvel exemple de menace sur la s\u00e9curit\u00e9 des informations : un email de<\/span> <span class=\"hps\">phishing<\/span> se pr\u00e9sentant\u00a0<span class=\"hps\">comme une suggestion<\/span>\u00a0<span class=\"hps\">l\u00e9gitime \u00e9manant de Google de<\/span> mise<span class=\"hps\">\u00a0\u00e0 jour de votre<\/span> <span class=\"hps\">navigateur<\/span> <span class=\"hps\">Google Chrome<\/span> fait actuellement beaucoup de victimes sur internet<span class=\"\"><span class=\"\">.<\/span><\/span><\/div>\n<div dir=\"ltr\"><span class=\"hps\">Les utilisateurs sont<\/span> <span class=\"hps\">invit\u00e9s \u00e0<\/span> <span class=\"hps\">cliquer sur un lien<\/span> <span class=\"hps\">pour<\/span> <span class=\"hps\">mettre \u00e0 jour<\/span> <span class=\"hps\">leur navigateur Chrome<\/span>.<\/div>\n<div dir=\"ltr\"><\/div>\n<div dir=\"ltr\">La pr\u00e9tendue mise \u00e0 jour s&rsquo;effectue au travers du lancement d&rsquo;u<span class=\"hps\">n<\/span> <span class=\"hps\">ex\u00e9cutable dont le\u00a0<\/span><span class=\"\">nom<\/span>\u00a0<span class=\"hps\">ChromeSetup.exe fait penser \u00e0 une mise \u00e0 jour officielle de votre navigateur<\/span><span class=\"\">,<\/span> <span class=\"hps\">qui<\/span>\u00a0 va\u00a0<span class=\"hps\">crypter des fichiers<\/span> <span class=\"hps\">sp\u00e9cifiques<\/span> <span class=\"hps\">sur l&rsquo;ordinateur de<\/span> <span class=\"hps\">la victime<\/span>, puis <span class=\"hps\">demander une ran\u00e7on<\/span> <span class=\"hps\">pour que les<\/span> <span class=\"hps\">donn\u00e9es soient<\/span> <span class=\"hps\">d\u00e9crypt\u00e9es<\/span>.<span class=\"hps\">Mais ce d\u00e9cryptage<\/span> <span class=\"hps\">a un prix<\/span>: <span class=\"hps\">le montant<\/span> <span class=\"hps\">\u00e9tant<\/span><span class=\"hps\">\u00a0est de<\/span> <span class=\"hps\">deux<\/span> <span class=\"hps\">bitcoins<\/span> <span class=\"hps\">(environ<\/span> <span class=\"hps\">$ 450<\/span><span class=\"\">, ou 400 \u20ac<\/span>), <span class=\"hps\">et \u00a0le d\u00e9lai de paiement de la ran\u00e7on est\u00a0limit\u00e9<\/span>\u00a0\u00e0\u00a0<span class=\"hps\">96 heures<\/span>.<span class=\"hps\">L&rsquo;adresse<\/span> <span class=\"hps\">email<\/span> <span class=\"hps\">de l&rsquo;exp\u00e9diteur<\/span> <span class=\"hps\">a \u00e9t\u00e9<\/span> <span class=\"hps\">habilement maquill\u00e9e<\/span>\u00a0<span class=\"hps\">pour appara\u00eetre comme \u00e9manant de<\/span>\u00a0<span class=\"hps\">Google<\/span>.<span class=\"hps\">Les experts mettent en garde les utilisateurs sur le fait<\/span>\u00a0<span class=\"hps\">que si<\/span> <span class=\"hps\">les chevaux de Troie<\/span> <span class=\"hps\">actifs peuvent<\/span> <span class=\"hps\">\u00eatre \u00e9limin\u00e9s gr\u00e2ce aux anti-virus du march\u00e9<\/span><span class=\"\">, il est beaucoup<\/span> <span class=\"hps\">plus difficile<\/span> <span class=\"hps\">et parfois impossible de<\/span> <span class=\"hps\">r\u00e9cup\u00e9rer des fichiers chiffr\u00e9s<\/span>.<span class=\"hps\">Alors que les d\u00e9veloppements<\/span> <span class=\"hps\">technologiques rapides<\/span> <span class=\"hps\">ont fourni<\/span> <span class=\"hps\">de vastes gisements d&rsquo;<\/span><span class=\"hps\">opportunit\u00e9<\/span> <span class=\"hps\">et<\/span>\u00a0d<span class=\"hps\">es sources potentielles<\/span> <span class=\"hps\">d&rsquo;efficacit\u00e9<\/span> <span class=\"hps\">pour les organisations<\/span> <span class=\"hps\">de toutes tailles<\/span>, <span class=\"hps\">ces nouvelles technologies<\/span> <span class=\"hps\">ont \u00e9galement apport\u00e9<\/span> <span class=\"hps\">des menaces sans pr\u00e9c\u00e9dent<\/span> <span class=\"hps\">avec elles<\/span>.<\/p>\n<h2>Sensibilisation et formation \u00e0 la s\u00e9curit\u00e9<\/h2>\n<pre id=\"tw-target-text\" class=\"tw-data-text vk_txt tw-ta tw-text-small\" dir=\"ltr\" data-fulltext=\"\" data-placeholder=\"Traduction\">La sensibilisation du personnel des entreprises sur les dangers du phishing et de la s\u00e9curit\u00e9 de l'information est maintenant une exigence d'affaires critique.<\/pre>\n<\/div>\n<\/div>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20S%C3%A9curit%C3%A9%3A%20Tentative%20d%27hame%C3%A7onnage%20sous%20le%20nom%20de%20Google&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fnon-classifiee%2Fsecurite-tentative-dhameconnage-sous-le-nom-de-google&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"b791f78b5a\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-258\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-258\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-258\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-258\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Un nouvel exemple de menace sur la s\u00e9curit\u00e9 des informations : un email de phishing se pr\u00e9sentant\u00a0comme une suggestion\u00a0l\u00e9gitime \u00e9manant de Google de mise\u00a0\u00e0 jour de votre navigateur Google Chrome fait actuellement beaucoup de victimes sur internet. Les utilisateurs sont invit\u00e9s \u00e0 cliquer sur un lien pour mettre \u00e0 jour leur navigateur Chrome. La&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20S%C3%A9curit%C3%A9%3A%20Tentative%20d%27hame%C3%A7onnage%20sous%20le%20nom%20de%20Google&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fnon-classifiee%2Fsecurite-tentative-dhameconnage-sous-le-nom-de-google&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"b791f78b5a\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-258\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-258\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-258\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-258\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[25,1,62],"tags":[70,65,69,71,64,68,67,63,66],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>S\u00e9curit\u00e9: Tentative d&#039;hame\u00e7onnage sous le nom de Google - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"La s\u00e9curit\u00e9 de l&#039;information, exigence critique pour le business en mati\u00e8re de protection et de confidentialit\u00e9 des donn\u00e9es\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9: Tentative d&#039;hame\u00e7onnage sous le nom de Google\" \/>\n<meta property=\"og:description\" content=\"La s\u00e9curit\u00e9 de l&#039;information, exigence critique pour le business en mati\u00e8re de protection et de confidentialit\u00e9 des donn\u00e9es\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-24T12:57:23+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg\",\"contentUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\",\"name\":\"S\\u00e9curit\\u00e9: Tentative d'hame\\u00e7onnage sous le nom de Google - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage\"},\"datePublished\":\"2015-02-24T12:57:23+00:00\",\"dateModified\":\"2015-02-24T12:57:23+00:00\",\"description\":\"La s\\u00e9curit\\u00e9 de l'information, exigence critique pour le business en mati\\u00e8re de protection et de confidentialit\\u00e9 des donn\\u00e9es\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ISO\/IEC 27001\",\"item\":\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"S\\u00e9curit\\u00e9: Tentative d&rsquo;hame\\u00e7onnage sous le nom de Google\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage\"},\"author\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"S\\u00e9curit\\u00e9: Tentative d&rsquo;hame\\u00e7onnage sous le nom de Google\",\"datePublished\":\"2015-02-24T12:57:23+00:00\",\"dateModified\":\"2015-02-24T12:57:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage\"},\"wordCount\":252,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg\",\"keywords\":[\"antivirus\",\"Cheval de troie\",\"cyber-s\\u00e9curit\\u00e9\",\"hame\\u00e7onnage\",\"ISO 27001\",\"ISO 27002\",\"phishing\",\"sc\\u00e9urit\\u00e9\",\"virus\"],\"articleSection\":[\"ISO\/IEC 27001\",\"Non classifi\\u00e9(e)\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9: Tentative d'hame\u00e7onnage sous le nom de Google - Blog de la Transformation Digitale","description":"La s\u00e9curit\u00e9 de l'information, exigence critique pour le business en mati\u00e8re de protection et de confidentialit\u00e9 des donn\u00e9es","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9: Tentative d'hame\u00e7onnage sous le nom de Google","og_description":"La s\u00e9curit\u00e9 de l'information, exigence critique pour le business en mati\u00e8re de protection et de confidentialit\u00e9 des donn\u00e9es","og_url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-02-24T12:57:23+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"http:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"http:\/\/www.ab-consulting.fr\/blog\/#website","url":"http:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage","inLanguage":"fr-FR","url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg","contentUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google","name":"S\u00e9curit\u00e9: Tentative d'hame\u00e7onnage sous le nom de Google - Blog de la Transformation Digitale","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage"},"datePublished":"2015-02-24T12:57:23+00:00","dateModified":"2015-02-24T12:57:23+00:00","description":"La s\u00e9curit\u00e9 de l'information, exigence critique pour le business en mati\u00e8re de protection et de confidentialit\u00e9 des donn\u00e9es","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"ISO\/IEC 27001","item":"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001"},{"@type":"ListItem","position":4,"name":"S\u00e9curit\u00e9: Tentative d&rsquo;hame\u00e7onnage sous le nom de Google"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage"},"author":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"S\u00e9curit\u00e9: Tentative d&rsquo;hame\u00e7onnage sous le nom de Google","datePublished":"2015-02-24T12:57:23+00:00","dateModified":"2015-02-24T12:57:23+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#webpage"},"wordCount":252,"commentCount":0,"publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2013\/06\/Alain0804013-231x300.jpg","keywords":["antivirus","Cheval de troie","cyber-s\u00e9curit\u00e9","hame\u00e7onnage","ISO 27001","ISO 27002","phishing","sc\u00e9urit\u00e9","virus"],"articleSection":["ISO\/IEC 27001","Non classifi\u00e9(e)","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/securite-tentative-dhameconnage-sous-le-nom-de-google#respond"]}]},{"@type":"Person","@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\/isoiec-27001\" class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/non-classifiee\" class=\"advgb-post-tax-term\">Non classifi\u00e9(e)<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">ISO\/IEC 27001<\/span>","<span class=\"advgb-post-tax-term\">Non classifi\u00e9(e)<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">antivirus<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">Cheval de troie<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">hame\u00e7onnage<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">phishing<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">sc\u00e9urit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">virus<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">antivirus<\/span>","<span class=\"advgb-post-tax-term\">Cheval de troie<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">hame\u00e7onnage<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">phishing<\/span>","<span class=\"advgb-post-tax-term\">sc\u00e9urit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">virus<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 24 f\u00e9vrier 2015","modified":"Updated on 24 f\u00e9vrier 2015"},"absolute_dates_time":{"created":"Posted on 24 f\u00e9vrier 2015 13 h 57 min","modified":"Updated on 24 f\u00e9vrier 2015 13 h 57 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-4a","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":964,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/10-indices-hameconnage","url_meta":{"origin":258,"position":0},"title":"10 trucs pour reconna\u00eetre un mail d&rsquo;hame\u00e7onnage","date":"17 octobre 2015","format":false,"excerpt":"Malheureusement, il n'y a pas qu'une seule technique qui fonctionnerait dans toutes les situations. Il est, par cons\u00e9quent, difficile de d\u00e9tecter un email d'hame\u00e7onnage. Cependant il existe des indices qui permettent d'\u00e9veiller les soup\u00e7ons. Cet article r\u00e9pertorie 10 d'entre eux.","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"10 indices pour reconna\u00eetre un mail d'hame\u00e7onnage","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/phishing.jpeg?fit=424%2C283&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1155,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/phishing-mode-emploi","url_meta":{"origin":258,"position":1},"title":"Phishing &#8211; Mode d&#8217;emploi","date":"28 octobre 2015","format":false,"excerpt":"AB Consulting\u00a0vous propose une s\u00e9rie d'articles destin\u00e9s \u00e0 la sensibilisation sur les risques en mati\u00e8re de s\u00e9curit\u00e9 de l'information. Suite \u00e0 notre pr\u00e9c\u00e9dent article 10 trucs pour\u00a0reconna\u00eetre un mail d'hame\u00e7onnage, aujourd'hui, nous allons revisiter la fa\u00e7on de rep\u00e9rer une tentative de phishing\u00a0en nous\u00a0concentrant sur une campagne r\u00e9cente ciblant les clients\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"phishing - mode d'emploi","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/piratage-300x158.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":282,"url":"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-ingenierie-sociale","url_meta":{"origin":258,"position":2},"title":"Cyber-s\u00e9curit\u00e9 &#8211; Ing\u00e9nierie sociale: un risque majeur","date":"29 ao\u00fbt 2015","format":false,"excerpt":"Une bonne hygi\u00e8ne informatique est le meilleur rem\u00e8de contre les risques en mati\u00e8re de cyber-s\u00e9curit\u00e9 Les \u00eatres humains, comme nous le savons bien, sont imparfaits. Nos cerveaux sont r\u00e9gis par un m\u00e9lange complexe d'\u00e9motions et (esp\u00e9rons-le) des processus de pens\u00e9e rationnelle, ce qui nous rend vuln\u00e9rables \u00e0 ceux qui veulent\u2026","rel":"","context":"Dans &quot;CSX&quot;","img":{"alt_text":"mots de passe dangereux","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/08\/ashley-madison-pwd-300x125.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6879,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/isoiec-27001\/smsi-iso-27001-vs-rgpd","url_meta":{"origin":258,"position":3},"title":"SMSI certifi\u00e9 ISO 27001 vs conformit\u00e9  RGPD","date":"2 d\u00e9cembre 2018","format":false,"excerpt":"Le RGPD et la norme ISO 27001 ont beaucoup en commun. Tous deux visent \u00e0 renforcer la s\u00e9curit\u00e9 des donn\u00e9es et r\u00e9duire le risque de failles de s\u00e9curit\u00e9. De m\u00eame, tous deux exigent des entreprises qu\u2019elles assurent la confidentialit\u00e9, l\u2019int\u00e9grit\u00e9 et la disponibilit\u00e9 des donn\u00e9es sensibles. ISO 27001 est une\u2026","rel":"","context":"Dans &quot;GDPR&quot;","img":{"alt_text":"ISO 27001 : un SMSI certifi\u00e9s est-il la solution pour la conformit\u00e9 RGPD?","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2018\/11\/ISO-27001-vs-RGPD-blog.jpg?fit=1200%2C309&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4795,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/securite-sur-internet-10-bonnes-pratiques-essentielles","url_meta":{"origin":258,"position":4},"title":"S\u00e9curit\u00e9 sur internet : 10 pratiques essentielles","date":"21 septembre 2017","format":false,"excerpt":"Dans le cadre du mois de la cybers\u00e9curit\u00e9 2017, AB Consulting CI et 2AB & Associates, sponsors officiels depuis plusieurs ann\u00e9es, s'associent de nouveau \u00e0 la campagne de sensibilisation des citoyens sur les bonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 sur internet. 10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet\u2026","rel":"","context":"Dans &quot;Cyber-r\u00e9silience&quot;","img":{"alt_text":"10 pratiques essentielles pour rester en s\u00e9curit\u00e9 sur internet","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2017\/09\/cybersecurite-2017-livre-blanc.jpg?fit=580%2C819&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"https:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":258,"position":5},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/258"}],"collection":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=258"}],"version-history":[{"count":13,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/258\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/258\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}