{"id":665,"date":"2015-10-06T00:17:13","date_gmt":"2015-10-05T23:17:13","guid":{"rendered":"http:\/\/www.ab-consulting.fr\/blog\/?p=665"},"modified":"2015-10-06T18:54:07","modified_gmt":"2015-10-06T17:54:07","slug":"cyber-attaque-t-mobile","status":"publish","type":"post","link":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","title":{"rendered":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d&rsquo;abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses fournisseurs, en l\u2019occurrence <strong>Experian<\/strong>, qui est charg\u00e9 d\u2019\u00e9valuer la solvabilit\u00e9 des abonn\u00e9s de l\u2019op\u00e9rateur aux \u00c9tats-Unis.\u00a0<\/em><\/p>\n<p><a href=\"http:\/\/plus.google.com\/118075462993454544693\/about\" rel=\"Author\"><img loading=\"lazy\" class=\"aligncenter wp-image-670\" src=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile.jpeg?resize=591%2C394\" alt=\"cyber-attaque contre T-Mobile\" width=\"591\" height=\"394\" srcset=\"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile.jpeg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile.jpeg?w=424&amp;ssl=1 424w\" sizes=\"(max-width: 591px) 100vw, 591px\" data-recalc-dims=\"1\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">Trustev, la start-up irlandaise sp\u00e9cialis\u00e9e dans la pr\u00e9vention des fraudes, a signal\u00e9 la pr\u00e9sence sur le Dark Web de lots de donn\u00e9es qui pourraient provenir\u00a0de ce piratage. Et ce,\u00a0seulement 24 heures\u00a0apr\u00e8s la <a href=\"https:\/\/www.experian.com\/data-breach\/t-mobilefacts.html?intcmp=tmdb\" target=\"_blank\">confirmation par Experian<\/a>, le 1er octobre,\u00a0 du piratage de donn\u00e9es personnelles des clients de T-Mobile ayant sign\u00e9\u00a0un contrat avec l\u2019op\u00e9rateur entre le 1er septembre 2013 et le 16 septembre 2015, soit environ 15 millions d&rsquo;abonn\u00e9s..<\/p>\n<h2 style=\"text-align: justify;\"><strong>La cyber-attaque contre T-Mobile<\/strong><\/h2>\n<p>Selon un courrier\u00a0de John Legere, PDG de T-Mobile, les donn\u00e9es vol\u00e9es comprennent:<\/p>\n<ul>\n<li>les noms, adresses, dates de naissance et num\u00e9ros de t\u00e9l\u00e9phone des abonn\u00e9s,<\/li>\n<li>leurs num\u00e9ros de s\u00e9curit\u00e9 sociale \u00ab\u00a0crypt\u00e9s\u00a0\u00bb et d&rsquo;autres num\u00e9ros d&rsquo;identit\u00e9 (tels que num\u00e9ros \u00a0passeport ou de permis de conduire),<\/li>\n<li>\u00abdes informations suppl\u00e9mentaires utilis\u00e9es pour leur\u00a0\u00e9valuation de solvabilit\u00e9\u00a0pour T-Mobile\u00a0\u00bb<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Aucune information\u00a0de paiement telle\u00a0que\u00a0les num\u00e9ros de\u00a0carte de cr\u00e9dit ou de cartes de d\u00e9bit n&rsquo;aurait\u00a0\u00e9t\u00e9 d\u00e9rob\u00e9e\u00a0par les pirates, ce qui n&rsquo;est cependant pas tr\u00e8s r\u00e9confortant d&rsquo;autant que, selon T-Mobile, bien que les num\u00e9ros de s\u00e9curit\u00e9 sociale\u00a0et d&rsquo;autres num\u00e9ros d&rsquo;identification aient\u00a0\u00e9t\u00e9 crypt\u00e9s, il est \u00e0 craindre\u00a0que\u00a0le cryptage ait \u00e9t\u00e9 d\u00e9cod\u00e9 par les pirates.<\/p>\n<p>Les num\u00e9ros de s\u00e9curit\u00e9 sociale\u00a0d\u00e9rob\u00e9s, combin\u00e9s\u00a0avec les autres donn\u00e9es d&rsquo;identification telles que\u00a0les noms et adresses, peuvent permettre de nombreux\u00a0types de vol d&rsquo;identit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Un escroc pourrait les utiliser pour ouvrir un\u00a0compte carte de cr\u00e9dit, demander des pr\u00eats bancaires pour les articles comme des\u00a0voitures par exemple, ou m\u00eame faire de fausses d\u00e9clarations fiscales en votre nom.<\/p>\n<p>T-Mobile et Experian ont confirm\u00e9 que le vol des donn\u00e9es\u00a0\u00e9tait un r\u00e9sultat de l&rsquo;acc\u00e8s non autoris\u00e9 \u00e0 un serveur d&rsquo;Experian sur lequel\u00a0les donn\u00e9es des clients de T-Mobile \u00e9taient stock\u00e9es.<\/p>\n<p style=\"text-align: justify;\">Le site de l\u2019op\u00e9rateur a ouvert une page pour informer les personnes concern\u00e9es des mesures prises. T-Mobile offre un abonnement gratuit de deux ans au service de suivi de cr\u00e9dit et de restauration d&rsquo;identit\u00e9 <strong>ProtectMyID<\/strong> \u00e0 toute victime potentielle du piratage. Mais, ironie de la situation, ProtectMyID est\u00a0une division d\u2019Experian et la proposition de John Legere a fait l\u2019objet de vives attaques sur Twitter. \u00ab\u00a0Experian comme service de protection\u2026 J\u2019ai entendu votre message. Je me mets tr\u00e8s rapidement en qu\u00eate d\u2019une autre option pour demain\u00a0\u00bb, a tweet\u00e9 John Legere jeudi apr\u00e8s-midi, en pr\u00e9cisant que \u00ab\u00a0l&rsquo;autre option serait \u00e9galement gratuite\u00a0\u00bb.<\/p>\n<h2 style=\"text-align: justify;\">Les fournisseurs externes : cibles id\u00e9ales pour une cyber-attaque<\/h2>\n<p style=\"text-align: justify;\">Les fournisseurs externes et sous-traitants\u00a0sont devenus une cible attrayante et payante pour les pirates, car ils constituent\u00a0un moyen facile d&rsquo;acc\u00e9der aux entreprises, surtout aux\u00a0grandes organisations. Certains des plus gros\u00a0vols de donn\u00e9es de ces\u00a0derni\u00e8res ann\u00e9es &#8211; y compris ceux concernant Target et Home Depot aux USA &#8211; n&rsquo;ont \u00e9t\u00e9 possibles\u00a0qu&rsquo;en raison de la s\u00e9curit\u00e9 insuffisante\u00a0des\u00a0fournisseurs.<\/p>\n<p style=\"text-align: justify;\">Aujourd&rsquo;hui, il n&rsquo;y a quasiment\u00a0aucune organisation qui ne repose pas sur des\u00a0fournisseurs. Il est donc essentiel que le management des entreprises\u00a0devienne plus rigoureux avec leurs\u00a0partenaires commerciaux en ce qui concerne l&rsquo;assurance des risques de l&rsquo;information. Si les fournisseurs doivent\u00a0avoir acc\u00e8s aux donn\u00e9es d&rsquo;une entreprise, il est essentiel qu&rsquo;ils soient\u00a0soumis au minimum\u00a0au m\u00eame niveau de s\u00e9curit\u00e9 que la soci\u00e9t\u00e9 qui a recours \u00e0\u00a0leurs services.<\/p>\n<blockquote>\n<p style=\"text-align: justify;\"><em>Vous assurer que vos fournisseurs &#8211; qu&rsquo;ils soient\u00a0sous-traitant informatique, avocat, comptable, banque ou, dans le\u00a0cas de T-Mobile, une agence d&rsquo;\u00e9valuation de solvabilit\u00e9\u00a0&#8211; applique strictement de\u00a0robustes pratiques de s\u00e9curit\u00e9 de l&rsquo;information est un imp\u00e9ratif\u00a0dans le climat technologique \u00e0 haut risque actuel. Il est vital\u00a0que tous vos fournisseurs disposent d&rsquo;un cadre de cybers\u00e9curit\u00e9 clair, parfaitement\u00a0d\u00e9fini et bien en place, autant dans votre int\u00e9r\u00eat que dans le leur.<\/em><\/p>\n<\/blockquote>\n<h2><strong>Comment s\u00e9curiser la totalit\u00e9 de la cha\u00eene?<\/strong><\/h2>\n<p style=\"text-align: justify;\">ISO 27001,\u00a0la norme internationale reconnue mondialement d\u00e9crit les exigences\u00a0pour un syst\u00e8me de management\u00a0de la s\u00e9curit\u00e9 de l&rsquo;information (SMSI), et la certification ISO 27001 d&rsquo;une organisation\u00a0d\u00e9montre qu&rsquo;une entreprise\u00a0applique les meilleures pratiques internationales en mati\u00e8re de s\u00e9curit\u00e9 de l&rsquo;information.<\/p>\n<p style=\"text-align: justify;\">Par cons\u00e9quent, exiger de vos fournisseurs et sous-traitants ayant un acc\u00e8s \u00e0 vos donn\u00e9es qu&rsquo;ils soient certifi\u00e9s ISO 27001 devrait\u00a0constituer un pr\u00e9-requis de tout\u00a0appel d&rsquo;offres. Bien s\u00fbr le nombre de fournisseurs potentiels risque d&rsquo;\u00eatre plus r\u00e9duit et sans doute les co\u00fbts seront plus \u00e9lev\u00e9s, mais il vous appartient de mesurer le risque encouru en cas de cyber-attaque sur votre fournisseur qui pourrait par rebond compromettre vos donn\u00e9es.<\/p>\n<p style=\"text-align: justify;\">Les impacts peuvent \u00eatre colossaux notamment en mati\u00e8re de perte de r\u00e9putation et d&rsquo;image, de perte de client\u00e8le ou m\u00eame de chute de vos actions si vous \u00eates cot\u00e9s en bourse. Souvenez-vous sur les douze derniers mois,\u00a0les cyber-attaques ont co\u00fbt\u00e9 globalement plus de 400 milliards d&rsquo;euros (soit environ de 262 millions de milliards en\u00a0FCFA !!!) aux entreprises dans le monde. A titre d&rsquo;exemple, on estime que l&rsquo;attaque perp\u00e9tr\u00e9e cette ann\u00e9e sur TV5 Monde aurait d\u00e9j\u00e0 co\u00fbt\u00e9 \u00e0 la cha\u00eene de t\u00e9l\u00e9vision Fran\u00e7aise une\u00a0coquette somme de l&rsquo;ordre\u00a0de 4 \u00e0 5\u00a0millions d&rsquo;Euros.<\/p>\n<p style=\"text-align: justify;\">Mais la cyber-s\u00e9curit\u00e9 qui vise \u00e0 pr\u00e9venir les menaces\u00a0et \u00e0 les d\u00e9tecter n&rsquo;est pas suffisante car il faut aussi pr\u00e9parer l&rsquo;organisation, en cas d&rsquo;attaque r\u00e9ussie, \u00e0 se remettre rapidement des dommages subis. Un cadre de cyber r\u00e9silience tel que RESILIA, r\u00e9cemment publi\u00e9 par AXELOS, viendra ad\u00e9quatement compl\u00e9ter une certification ISO 27001.<\/p>\n<p style=\"text-align: justify;\">Dans tous les cas, une sensibilisation de l&rsquo;ensemble du personnel de l&rsquo;Entreprise sera indispensable\u00a0car la d\u00e9cision de certifier une organisation contre les cyber-risques en impl\u00e9mentant un Syst\u00e8me de Management de la S\u00e9curit\u00e9 de l&rsquo;Information bas\u00e9 sur ISO 27001 rel\u00e8ve d&rsquo;une d\u00e9cision de Gouvernance qui est du ressort du Conseil d&rsquo;Administration, repr\u00e9sentant les parties-prenantes de l&rsquo;Entreprise et seul \u00e0 m\u00eame de donner la direction.<\/p>\n<p style=\"text-align: justify;\">La strat\u00e9gie de protection et de cyber-r\u00e9silience rel\u00e8ve pour sa part du Comit\u00e9 de Direction qui d\u00e9finit les strat\u00e9gies de l&rsquo;Entreprise, est responsable des politiques et de la planification.<\/p>\n<p style=\"text-align: justify;\">La r\u00e9alisation des strat\u00e9gies consistant pour la s\u00e9curit\u00e9 et la r\u00e9silience, \u00e0 impl\u00e9menter et am\u00e9liorer un SMSI, \u00e0 pr\u00e9parer une certification ISO 27001 et \u00e0 sensibiliser et former l&rsquo;ensemble du personnel aux bonnes pratiques de s\u00e9curit\u00e9 de l&rsquo;information et \u00e0 la cyber-r\u00e9silience constituera la responsabilit\u00e9 de tous les niveaux de management.<\/p>\n<p style=\"text-align: justify;\">Il s&rsquo;agit donc d&rsquo;un approche top-down qui couvre la totalit\u00e9 de l&rsquo;organisation et pas seulement, comme je l&rsquo;entend trop souvent dans les Enterprises, le d\u00e9partement informatique qui, s&rsquo;il est bien s\u00fbr impliqu\u00e9 pour les aspects techniques, le sera d&rsquo;une fa\u00e7on sans doute moins importante que d\u00e9partement des ressources humaines, car la s\u00e9curit\u00e9 ne peut pas s&rsquo;abriter derri\u00e8re la technologie. C&rsquo;est d&rsquo;abord une responsabilit\u00e9 primordiale des individus.<\/p>\n<p style=\"text-align: justify;\"><em><strong>Pour plus d&rsquo;informations ou pour vous abonner \u00e0 notre newsletter, merci de compl\u00e9ter le formulaire de contact :<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><div id='contact-form-665'>\n<form action='https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#contact-form-665' method='post' class='contact-form commentsblock'>\n<script>\n\t\t\t( function () {\n\t\t\t\tconst contact_forms = document.getElementsByClassName('contact-form');\n\n\t\t\t\tfor ( const form of contact_forms ) {\n\t\t\t\t\tform.onsubmit = function() {\n\t\t\t\t\t\tconst buttons = form.getElementsByTagName('button');\n\n\t\t\t\t\t\tfor( const button of buttons ) {\n\t\t\t\t\t\t\tbutton.setAttribute('disabled', true);\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} )();\n\t\t<\/script>\n<div class='grunion-field-wrap grunion-field-name-wrap'  >\n<label\n\t\t\t\tfor='g665-nom'\n\t\t\t\tclass='grunion-field-label name'\n\t\t\t\t>Nom<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g665-nom'\n\t\t\t\t\tid='g665-nom'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='name' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-email-wrap'  >\n<label\n\t\t\t\tfor='g665-email'\n\t\t\t\tclass='grunion-field-label email'\n\t\t\t\t>E-mail<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='email'\n\t\t\t\t\tname='g665-email'\n\t\t\t\t\tid='g665-email'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='email' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g665-entreprise'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Entreprise<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g665-entreprise'\n\t\t\t\t\tid='g665-entreprise'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-text-wrap'  >\n<label\n\t\t\t\tfor='g665-pays'\n\t\t\t\tclass='grunion-field-label text'\n\t\t\t\t>Pays<span>(obligatoire)<\/span><\/label>\n<input\n\t\t\t\t\ttype='text'\n\t\t\t\t\tname='g665-pays'\n\t\t\t\t\tid='g665-pays'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='text' \n\t\t\t\t\trequired aria-required='true'\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-url-wrap'  >\n<label\n\t\t\t\tfor='g665-siteweb'\n\t\t\t\tclass='grunion-field-label url'\n\t\t\t\t>Site Web<\/label>\n<input\n\t\t\t\t\ttype='url'\n\t\t\t\t\tname='g665-siteweb'\n\t\t\t\t\tid='g665-siteweb'\n\t\t\t\t\tvalue=''\n\t\t\t\t\tclass='url' \n\t\t\t\t\t\n\t\t\t\t\/>\n\t<\/div>\n\n<div class='grunion-field-wrap grunion-field-textarea-wrap'  >\n<label\n\t\t\t\tfor='contact-form-comment-g665-commentaire'\n\t\t\t\tclass='grunion-field-label textarea'\n\t\t\t\t>Commentaire<span>(obligatoire)<\/span><\/label>\n<textarea\n\t\t                name='g665-commentaire'\n\t\t                id='contact-form-comment-g665-commentaire'\n\t\t                rows='20' class='textarea'  required aria-required='true'><\/textarea>\n\t<\/div>\n\t<p class='contact-submit'>\n\t\t<button type='submit' class='pushbutton-wide'>Envoyer<\/button>\t\t<input type='hidden' name='contact-form-id' value='665' \/>\n\t\t<input type='hidden' name='action' value='grunion-contact-form' \/>\n\t\t<input type='hidden' name='contact-form-hash' value='6db31058a10d04cba21507e3421cf9df964beed5' \/>\n\t<\/p>\n<p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"ak_\"><label>&#916;<textarea name=\"ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"ak_js\" value=\"217\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><\/form>\n<\/div><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Un%20op%C3%A9rateur%20mobile%20victime%20d%27une%20cyber-attaque&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcyber-attaque-t-mobile&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"42150d74b1\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-665\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-665\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-665\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-665\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Environ 15 millions de personnes qui se sont abonn\u00e9es dans les trois derni\u00e8res ann\u00e9es aux services sans fil de T-Mobile, quatri\u00e8me op\u00e9rateur de t\u00e9l\u00e9phonie mobile des Etats Unis avec 25 millions d&rsquo;abonn\u00e9s, ont sans doute\u00a0\u00e9t\u00e9 victimes du vol de leurs informations personnelles suite \u00e0 une cyber-attaque r\u00e9ussie\u00a0contre l\u2019un de ses fournisseurs, en l\u2019occurrence Experian,&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Partager\u00a0:<\/h3><div class=\"sd-content\"><ul><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\" target=\"_blank\" title=\"Cliquer pour imprimer\" ><span>Imprimer<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BArticle%20partag%C3%A9%5D%20Un%20op%C3%A9rateur%20mobile%20victime%20d%27une%20cyber-attaque&body=https%3A%2F%2Fwww.ab-consulting.fr%2Fblog%2Fsecurite%2Fcyber-attaque-t-mobile&share=email\" target=\"_blank\" title=\"Cliquer pour envoyer un lien par e-mail \u00e0 un ami\" data-email-share-error-title=\"Votre messagerie est-elle configur\u00e9e\u00a0?\" data-email-share-error-text=\"Si vous rencontrez des probl\u00e8mes de partage par e-mail, votre messagerie n\u2019est peut-\u00eatre pas configur\u00e9e pour votre navigateur. Vous devrez peut-\u00eatre cr\u00e9er vous-m\u00eame une nouvelle messagerie.\" data-email-share-nonce=\"42150d74b1\" data-email-share-track-url=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=email\"><span>E-mail<\/span><\/a><\/li><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-665\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=facebook\" target=\"_blank\" title=\"Cliquez pour partager sur Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-665\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=twitter\" target=\"_blank\" title=\"Cliquez pour partager sur Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-665\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=linkedin\" target=\"_blank\" title=\"Cliquez pour partager sur LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-tumblr\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-tumblr sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=tumblr\" target=\"_blank\" title=\"Cliquez pour partager sur Tumblr\" ><span>Tumblr<\/span><\/a><\/li><li class=\"share-pinterest\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-pinterest-665\" class=\"share-pinterest sd-button share-icon\" href=\"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile?share=pinterest\" target=\"_blank\" title=\"Cliquez pour partager sur Pinterest\" ><span>Pinterest<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[73,62],"tags":[80,133,101,127,69,107,64,68,114,134,100,87,109,135],"jetpack_publicize_connections":[],"author_meta":{"display_name":"Alain Bonneaud","author_link":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"},"featured_img":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.9 (Yoast SEO v17.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Un op\u00e9rateur mobile victime d&#039;une cyber-attaque - Blog de la Transformation Digitale<\/title>\n<meta name=\"description\" content=\"Vous pouvez \u00eatre victime d&#039;une cyber-attaque r\u00e9ussie. La probabilit\u00e9 est proche de 100%. Exemple: les donn\u00e9es de 15 millions d&#039;abonn\u00e9s d\u00e9rob\u00e9es \u00e0 T-Mobile\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un op\u00e9rateur mobile victime d&#039;une cyber-attaque\" \/>\n<meta property=\"og:description\" content=\"Vous pouvez \u00eatre victime d&#039;une cyber-attaque r\u00e9ussie. La probabilit\u00e9 est proche de 100%. Exemple: les donn\u00e9es de 15 millions d&#039;abonn\u00e9s d\u00e9rob\u00e9es \u00e0 T-Mobile\" \/>\n<meta property=\"og:url\" content=\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\" \/>\n<meta property=\"og:site_name\" content=\"Blog de la Transformation Digitale\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abconsultingci\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-05T23:17:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-06T17:54:07+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:site\" content=\"@abonneaud\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Bonneaud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture est.\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\",\"name\":\"2AB & Associates\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/abconsultingci\/\",\"https:\/\/www.linkedin.com\/in\/alainbonneaud\/\",\"https:\/\/twitter.com\/abonneaud\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107\",\"width\":540,\"height\":107,\"caption\":\"2AB & Associates\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/\",\"name\":\"Blog de la Transformation Digitale\",\"description\":\"COBIT\\u00ae, VeriSM, ITIL\\u00ae, RESILIA, ISO 27001, ISO 20000\",\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage\",\"inLanguage\":\"fr-FR\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg\",\"contentUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage\",\"url\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\",\"name\":\"Un op\\u00e9rateur mobile victime d'une cyber-attaque - Blog de la Transformation Digitale\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage\"},\"datePublished\":\"2015-10-05T23:17:13+00:00\",\"dateModified\":\"2015-10-06T17:54:07+00:00\",\"description\":\"Vous pouvez \\u00eatre victime d'une cyber-attaque r\\u00e9ussie. La probabilit\\u00e9 est proche de 100%. Exemple: les donn\\u00e9es de 15 millions d'abonn\\u00e9s d\\u00e9rob\\u00e9es \\u00e0 T-Mobile\",\"breadcrumb\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"cybers\\u00e9curit\\u00e9\",\"item\":\"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Un op\\u00e9rateur mobile victime d&rsquo;une cyber-attaque\"}]},{\"@type\":\"Article\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#article\",\"isPartOf\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage\"},\"author\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\"},\"headline\":\"Un op\\u00e9rateur mobile victime d&rsquo;une cyber-attaque\",\"datePublished\":\"2015-10-05T23:17:13+00:00\",\"dateModified\":\"2015-10-06T17:54:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage\"},\"wordCount\":1343,\"commentCount\":2,\"publisher\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#organization\"},\"image\":{\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg\",\"keywords\":[\"COBIT\",\"cyber-attaque\",\"cyber-r\\u00e9silience\",\"cyber-risque\",\"cyber-s\\u00e9curit\\u00e9\",\"cybers\\u00e9curit\\u00e9\",\"ISO 27001\",\"ISO 27002\",\"ISO 27005\",\"menace de s\\u00e9curit\\u00e9\",\"resilia\",\"s\\u00e9curit\\u00e9\",\"s\\u00e9curit\\u00e9 de l'information\",\"T-Mobile\"],\"articleSection\":[\"cybers\\u00e9curit\\u00e9\",\"S\\u00e9curit\\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c\",\"name\":\"Alain Bonneaud\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"http:\/\/www.ab-consulting.fr\/blog\/#personlogo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g\",\"caption\":\"Alain Bonneaud\"},\"sameAs\":[\"http:\/\/www.ab-consulting.fr\",\"https:\/\/twitter.com\/abonneaud\"],\"url\":\"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Un op\u00e9rateur mobile victime d'une cyber-attaque - Blog de la Transformation Digitale","description":"Vous pouvez \u00eatre victime d'une cyber-attaque r\u00e9ussie. La probabilit\u00e9 est proche de 100%. Exemple: les donn\u00e9es de 15 millions d'abonn\u00e9s d\u00e9rob\u00e9es \u00e0 T-Mobile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","og_locale":"fr_FR","og_type":"article","og_title":"Un op\u00e9rateur mobile victime d'une cyber-attaque","og_description":"Vous pouvez \u00eatre victime d'une cyber-attaque r\u00e9ussie. La probabilit\u00e9 est proche de 100%. Exemple: les donn\u00e9es de 15 millions d'abonn\u00e9s d\u00e9rob\u00e9es \u00e0 T-Mobile","og_url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","og_site_name":"Blog de la Transformation Digitale","article_publisher":"https:\/\/www.facebook.com\/abconsultingci\/","article_published_time":"2015-10-05T23:17:13+00:00","article_modified_time":"2015-10-06T17:54:07+00:00","og_image":[{"url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@abonneaud","twitter_site":"@abonneaud","twitter_misc":{"\u00c9crit par":"Alain Bonneaud","Dur\u00e9e de lecture est.":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization","name":"2AB & Associates","url":"http:\/\/www.ab-consulting.fr\/blog\/","sameAs":["https:\/\/www.facebook.com\/abconsultingci\/","https:\/\/www.linkedin.com\/in\/alainbonneaud\/","https:\/\/twitter.com\/abonneaud"],"logo":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo","inLanguage":"fr-FR","url":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","contentUrl":"https:\/\/i2.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/04\/AB-Consulting-logo-h-vs.gif?fit=540%2C107","width":540,"height":107,"caption":"2AB & Associates"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#logo"}},{"@type":"WebSite","@id":"http:\/\/www.ab-consulting.fr\/blog\/#website","url":"http:\/\/www.ab-consulting.fr\/blog\/","name":"Blog de la Transformation Digitale","description":"COBIT\u00ae, VeriSM, ITIL\u00ae, RESILIA, ISO 27001, ISO 20000","publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/www.ab-consulting.fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage","inLanguage":"fr-FR","url":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg","contentUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg"},{"@type":"WebPage","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage","url":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile","name":"Un op\u00e9rateur mobile victime d'une cyber-attaque - Blog de la Transformation Digitale","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage"},"datePublished":"2015-10-05T23:17:13+00:00","dateModified":"2015-10-06T17:54:07+00:00","description":"Vous pouvez \u00eatre victime d'une cyber-attaque r\u00e9ussie. La probabilit\u00e9 est proche de 100%. Exemple: les donn\u00e9es de 15 millions d'abonn\u00e9s d\u00e9rob\u00e9es \u00e0 T-Mobile","breadcrumb":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/www.ab-consulting.fr\/blog"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite"},{"@type":"ListItem","position":3,"name":"cybers\u00e9curit\u00e9","item":"http:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite"},{"@type":"ListItem","position":4,"name":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque"}]},{"@type":"Article","@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#article","isPartOf":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage"},"author":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c"},"headline":"Un op\u00e9rateur mobile victime d&rsquo;une cyber-attaque","datePublished":"2015-10-05T23:17:13+00:00","dateModified":"2015-10-06T17:54:07+00:00","mainEntityOfPage":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#webpage"},"wordCount":1343,"commentCount":2,"publisher":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/#organization"},"image":{"@id":"http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#primaryimage"},"thumbnailUrl":"http:\/\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cyber-attaque-T-mobile-300x200.jpeg","keywords":["COBIT","cyber-attaque","cyber-r\u00e9silience","cyber-risque","cyber-s\u00e9curit\u00e9","cybers\u00e9curit\u00e9","ISO 27001","ISO 27002","ISO 27005","menace de s\u00e9curit\u00e9","resilia","s\u00e9curit\u00e9","s\u00e9curit\u00e9 de l'information","T-Mobile"],"articleSection":["cybers\u00e9curit\u00e9","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-attaque-t-mobile#respond"]}]},{"@type":"Person","@id":"http:\/\/www.ab-consulting.fr\/blog\/#\/schema\/person\/56962e20fa3aaac4e03764204c57b25c","name":"Alain Bonneaud","image":{"@type":"ImageObject","@id":"http:\/\/www.ab-consulting.fr\/blog\/#personlogo","inLanguage":"fr-FR","url":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d901ed6d3a81ad26a0335a7dae96b4f?s=96&d=mm&r=g","caption":"Alain Bonneaud"},"sameAs":["http:\/\/www.ab-consulting.fr","https:\/\/twitter.com\/abonneaud"],"url":"https:\/\/www.ab-consulting.fr\/blog\/author\/abonneaud"}]}},"coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\/cybersecurite-securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">S\u00e9curit\u00e9<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">COBIT<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-attaque<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-risque<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27001<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27002<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">ISO 27005<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">resilia<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/a>","<a href=\"https:\/\/www.ab-consulting.fr\/blog\/category\/securite\" class=\"advgb-post-tax-term\">T-Mobile<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">COBIT<\/span>","<span class=\"advgb-post-tax-term\">cyber-attaque<\/span>","<span class=\"advgb-post-tax-term\">cyber-r\u00e9silience<\/span>","<span class=\"advgb-post-tax-term\">cyber-risque<\/span>","<span class=\"advgb-post-tax-term\">cyber-s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">cybers\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">ISO 27001<\/span>","<span class=\"advgb-post-tax-term\">ISO 27002<\/span>","<span class=\"advgb-post-tax-term\">ISO 27005<\/span>","<span class=\"advgb-post-tax-term\">menace de s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">resilia<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9<\/span>","<span class=\"advgb-post-tax-term\">s\u00e9curit\u00e9 de l&#039;information<\/span>","<span class=\"advgb-post-tax-term\">T-Mobile<\/span>"]}},"comment_count":"2","relative_dates":{"created":"Posted 11 ans ago","modified":"Updated 11 ans ago"},"absolute_dates":{"created":"Posted on 6 octobre 2015","modified":"Updated on 6 octobre 2015"},"absolute_dates_time":{"created":"Posted on 6 octobre 2015 0 h 17 min","modified":"Updated on 6 octobre 2015 18 h 54 min"},"featured_img_caption":"","jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3OrbX-aJ","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1088,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/piratage-operateur-telecom","url_meta":{"origin":665,"position":0},"title":"Encore un piratage d&rsquo;op\u00e9rateur mobile","date":"26 octobre 2015","format":false,"excerpt":"Apr\u00e8s le piratage, d\u00e9but octobre, de l'op\u00e9rateur t\u00e9l\u00e9com T-Mobile aux USA, c'est au tour de l'op\u00e9rateur britannique TalkTalk d'avoir\u00a0\u00e9t\u00e9 victime d'une \u00ab cyberattaque \u00bb r\u00e9v\u00e9l\u00e9 en\u00a0fin de semaine derni\u00e8re. Cette cyber-attaque a permis \u00e0 des hackers de mettre la main sur un fichier complet de 4 millions de clients, donn\u00e9es\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Op\u00c3\u00a9rateur Talk Talk pirat\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/talktalk-300x225.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1057,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/10-trucs-sensibilisation-securite","url_meta":{"origin":665,"position":1},"title":"10 cl\u00e9s pour une sensibilisation r\u00e9ussie sur la s\u00e9curit\u00e9","date":"24 octobre 2015","format":false,"excerpt":"Les cyber-menaces pesant sur\u00a0votre entreprise sont g\u00e9n\u00e9ralement imput\u00e9es \u00e0 des personnes \u00e9trang\u00e8res \u00e0 l'Organisation ou \u00e0 des programmeurs v\u00e9reux ins\u00e9rant, dans vos applications, du code malveillant con\u00e7u pour exploiter\u00a0les informations sensibles pour\u00a0votre Entreprise, voler\u00a0les donn\u00e9es\u00a0confidentielles de vos clients et \/ ou vous d\u00e9rober\u00a0de l'argent. Cependant, la menace de s\u00e9curit\u00e9 se\u2026","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"S\u00e9curit\u00e9 menac\u00e9e de l'int\u00e9rieur","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/violation-s\u00e9curit\u00e9.jpeg?fit=424%2C283&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":462,"url":"https:\/\/www.ab-consulting.fr\/blog\/it-sm\/iso-20000\/cyber-securite-recherche-professionnels","url_meta":{"origin":665,"position":2},"title":"Cyber-s\u00e9curit\u00e9: une demande forte pour un profil rare","date":"19 septembre 2015","format":false,"excerpt":"\u00a0 L\u2019actuelle p\u00e9nurie de professionnels qualifi\u00e9s en\u00a0cyber-s\u00e9curit\u00e9 continue de constituer un probl\u00e8me majeur pour\u00a0toutes les industries aux Etats-Unis, en Europe, mais aussi dans le reste du monde. James Trainor, directeur adjoint par int\u00e9rim de la Division Cyber du FBI, a r\u00e9cemment d\u00e9clar\u00e9 que l'industrie de la cyber-s\u00e9curit\u00e9 doit absolument \"doubler\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"professionnel en cyber-s\u00c3\u00a9curit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/professionnel-securite-300x226.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":617,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cout-cybercriminalite","url_meta":{"origin":665,"position":3},"title":"Co\u00fbt de la cybercriminalit\u00e9 : 400 milliards d&rsquo;euros","date":"2 octobre 2015","format":false,"excerpt":"Selon un\u00a0nouveau rapport publi\u00e9 par Allianz Corporate & Specialty et intitul\u00e9 Un guide pour les Cyber-Risques: g\u00e9rer l'impact du d\u00e9veloppement\u00a0de l'interconnectivit\u00e9 (A guide to Cyber-Risk - Managing the Impact of Increasing Interconnectivity) r\u00e9v\u00e8le que la cybercriminalit\u00e9 co\u00fbte, dans le monde, 445 milliards\u00a0de dollars US\u00a0par ann\u00e9e, soit environ 400 milliards d'euros\u2026","rel":"","context":"Dans &quot;S\u00e9curit\u00e9&quot;","img":{"alt_text":"cybercriminalit\u00c3\u00a9","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/10\/cout-de-la-cybercriminalit\u00c3\u00a9-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6450,"url":"https:\/\/www.ab-consulting.fr\/blog\/securite\/cyber-escroqueries-eviter-les-pieges","url_meta":{"origin":665,"position":4},"title":"Top 5 des cyber-escroqueries","date":"18 octobre 2018","format":false,"excerpt":"Les cybercriminels recourent \u00e0 une grande vari\u00e9t\u00e9 de tactiques frauduleuses pour acc\u00e9der \u00e0 un appareil ou \u00e0 un r\u00e9seau. Leur objectif est toujours le m\u00eame : \u00a0extorquer de l'argent ou voler des informations pr\u00e9cieuses. Il est essentiels de comprendre les menaces et savoir comment vous en prot\u00e9ger, ainsi que votre\u2026","rel":"","context":"Dans &quot;cybers\u00e9curit\u00e9&quot;","img":{"alt_text":"Cyber-escroqueries - Evitez les pi\u00e8ges","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2018\/10\/cyber-escroqueries-blog-1.jpg?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":420,"url":"https:\/\/www.ab-consulting.fr\/blog\/non-classifiee\/cyber-securite-vs-cyber-resilience","url_meta":{"origin":665,"position":5},"title":"Cyber-s\u00e9curit\u00e9 vs cyber-r\u00e9silience","date":"15 septembre 2015","format":false,"excerpt":"On entend de plus en plus parler de cyber-s\u00e9curit\u00e9 et de cyber-r\u00e9silience. Mais au final, qu\u2019est-ce qui se cache derri\u00e8re ces termes compliqu\u00e9s pour le commun des mortels\u00a0? C\u2019est ce que nous allons essayer d\u2019expliquer au travers de cet article. S\u00e9curit\u00e9 ou R\u00e9silience\u00a0? De quoi parlons-nous\u00a0? Sous l\u2019administration Obama, les\u2026","rel":"","context":"Dans &quot;COBIT&quot;","img":{"alt_text":"cyber-curit\u00c3\u00a9 vs cyber-r\u00c3\u00a9silience","src":"https:\/\/i0.wp.com\/www.ab-consulting.fr\/blog\/wp-content\/uploads\/2015\/09\/hacker-300x200.jpeg?resize=350%2C200","width":350,"height":200},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/665"}],"collection":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/comments?post=665"}],"version-history":[{"count":13,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/665\/revisions"}],"predecessor-version":[{"id":709,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/posts\/665\/revisions\/709"}],"wp:attachment":[{"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/media?parent=665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/categories?post=665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ab-consulting.fr\/blog\/wp-json\/wp\/v2\/tags?post=665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}