{"id":26043,"date":"2022-12-14T11:45:00","date_gmt":"2022-12-14T10:45:00","guid":{"rendered":"https:\/\/perseus.de\/vishing\/"},"modified":"2026-03-27T11:46:55","modified_gmt":"2026-03-27T10:46:55","slug":"vishing","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/vishing\/","title":{"rendered":"Vishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26043\" class=\"elementor elementor-26043 elementor-22340\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Vishing\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e2b811 e-flex e-con-boxed e-con e-parent\" data-id=\"1e2b811\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2368204 e-con-full e-flex e-con e-child\" data-id=\"2368204\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37d2946 elementor-widget elementor-widget-text-editor\" data-id=\"37d2946\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 data-pm-slice=\"1 1 []\"><strong>Qu&rsquo;est-ce que le vishing ?<\/strong><\/h4><p>Le vishing est une forme particuli\u00e8re de phishing. Ici aussi, l&rsquo;objectif est d&rsquo;inciter les personnes \u00e0 r\u00e9v\u00e9ler des informations sensibles ou confidentielles. Contrairement \u00e0 l&rsquo;hame\u00e7onnage \u00ab\u00a0traditionnel\u00a0\u00bb, o\u00f9 les victimes sont contact\u00e9es par e-mail, la prise de contact se fait par t\u00e9l\u00e9phone. D&rsquo;o\u00f9 le nom de \u00ab\u00a0vishing\u00a0\u00bb. Ici, le terme anglais pour la voix (voice) et le phishing sont combin\u00e9s.    <\/p><p>Comme d&rsquo;autres m\u00e9thodes d&rsquo;hame\u00e7onnage, le vishing est une forme d&rsquo;ing\u00e9nierie sociale. Ainsi, il fait \u00e9galement appel aux \u00e9motions de la cible, tant dans le sens positif que n\u00e9gatif. Les \u00e9motions telles que la peur, le doute, la curiosit\u00e9 et la honte sont cibl\u00e9es afin d&rsquo;inciter les personnes \u00e0 agir dans le sens des attaquants.  <\/p><h4><strong>Pourquoi le vishing est-il particuli\u00e8rement dangereux ?<\/strong><\/h4><p>Le contact direct qui r\u00e9sulte de l&rsquo;entretien t\u00e9l\u00e9phonique peut exacerber les sentiments que nous venons d&rsquo;\u00e9voquer chez les personnes concern\u00e9es. Dans la confrontation directe, les personnes osent encore moins contredire l&rsquo;autre personne ou ne pas r\u00e9pondre aux demandes. Elles peuvent \u00e9galement moins se fier \u00e0 leur propre instinct, ce qui les pousse \u00e0 agir sans r\u00e9fl\u00e9chir.  <\/p><p>Une autre raison pour laquelle le vishing peut \u00eatre tr\u00e8s lucratif pour les cybercriminels est que l&rsquo;on croit plus facilement une voix humaine qu&rsquo;un e-mail num\u00e9rique d&rsquo;un exp\u00e9diteur inconnu. La prise de conscience du fait que les collaborateurs peuvent \u00e9galement \u00eatre tromp\u00e9s par t\u00e9l\u00e9phone n&rsquo;est parfois pas encore tr\u00e8s r\u00e9pandue. <\/p><h4><strong>O\u00f9 puis-je rencontrer le vishing dans ma vie quotidienne ?<\/strong><\/h4><p>Les attaques de vishing peuvent toucher n&rsquo;importe quelle entreprise. M\u00eame si, contrairement aux attaques de phishing traditionnelles, elles ne se propagent pas \u00e0 la vol\u00e9e et ne sont donc pas men\u00e9es \u00e0 grande \u00e9chelle, les acteurs de la menace utilisent de plus en plus le t\u00e9l\u00e9phone pour contacter directement leurs victimes potentielles. Les motivations suivantes sont au premier plan.  <\/p><h5>Motif possible num\u00e9ro 1 &#8211; Obtention d&rsquo;informations<\/h5><p>Vous, ou l&rsquo;un de vos employ\u00e9s, \u00eates appel\u00e9 par des cybercriminels, souvent sous un pr\u00e9texte tr\u00e8s banal. L&rsquo;attaquant peut par exemple se faire passer pour un employ\u00e9 d&rsquo;une organisation connue (par exemple une banque), appeler au nom d&rsquo;un fournisseur ou vouloir vendre quelque chose \u00e0 votre entreprise. Les questions sont habilement plac\u00e9es au cours de la conversation de mani\u00e8re \u00e0 ce que l&rsquo;interlocuteur ou l&rsquo;interlocutrice r\u00e9ponde sans h\u00e9siter et sans \u00e9veiller les soup\u00e7ons. Les r\u00e9ponses peuvent ensuite \u00eatre utilis\u00e9es par l&rsquo;attaquant pour mener des attaques de spear phishing ou de fraude au PDG.   <\/p><h5>Motif possible num\u00e9ro 2 &#8211; Manipulation t\u00e9l\u00e9phonique<\/h5><p>On parle \u00e9galement de vishing lorsque des collaborateurs appellent un num\u00e9ro de t\u00e9l\u00e9phone falsifi\u00e9 et contactent ainsi des cybercriminels sans se douter de rien. Imaginez que vous ayez un probl\u00e8me informatique et que vous soyez \u00e0 la recherche d&rsquo;un prestataire de services qui puisse vous aider \u00e0 r\u00e9soudre ce probl\u00e8me. Vous atterrissez sur une page d&rsquo;accueil et composez le num\u00e9ro qui y est indiqu\u00e9. Malheureusement, ce n&rsquo;est pas le support esp\u00e9r\u00e9 qui vous r\u00e9pond \u00e0 l&rsquo;autre bout du service, mais un d\u00e9linquant. Ici, on vous propose des solutions contre paiement. Il se peut que vous deviez les r\u00e9gler directement. Mais vous n&rsquo;obtiendrez pas le service esp\u00e9r\u00e9.      <\/p><h5>Motif possible num\u00e9ro 3 &#8211; Appels concrets \u00e0 l&rsquo;action<\/h5><p>L&rsquo;exemple suivant est tr\u00e8s direct. L&rsquo;attaquant vous contacte ou contacte l&rsquo;un de vos employ\u00e9s par t\u00e9l\u00e9phone et lui demande d&rsquo;agir concr\u00e8tement. Par exemple, il peut demander de transmettre certaines informations, comme les donn\u00e9es de connexion \u00e0 un service en ligne. Ou une activit\u00e9 sp\u00e9cifique peut \u00eatre demand\u00e9e, par exemple le transfert d&rsquo;une somme d&rsquo;argent et le r\u00e8glement d&rsquo;une facture pr\u00e9tendument impay\u00e9e. Si la personne h\u00e9site, des pressions sont exerc\u00e9es sur elle ou elle est attir\u00e9e par des offres positives (prix sp\u00e9ciaux, meilleures conditions).    <\/p><h4><strong>Comment reconna\u00eetre le vishing ?<\/strong><\/h4><p>De nos jours, il est difficile de d\u00e9tecter les attaques de phishing. Les cybercriminels \u00e9voluent \u00e9galement et deviennent de plus en plus professionnels dans leurs attaques. Il en va de m\u00eame pour les attaques de vishing. Pour d\u00e9tecter les attaques de vishing, les collaborateurs doivent \u00eatre vigilants. Pour les nouveaux contacts avec lesquels on n&rsquo;a pas eu de contact auparavant, il est conseill\u00e9 de faire une petite recherche sur Internet pour confirmer les d\u00e9tails. L&rsquo;entreprise mentionn\u00e9e existe-t-elle ? L&rsquo;adresse indiqu\u00e9e existe-t-elle ? Pouvez-vous trouver la personne qui vous a contact\u00e9 ? Si votre interlocuteur fait r\u00e9f\u00e9rence \u00e0 des coll\u00e8gues \u00e0 vous, demandez \u00e9ventuellement bri\u00e8vement \u00e0 la personne concern\u00e9e si la situation ou l&rsquo;\u00e9change a r\u00e9ellement eu lieu. Un certain scepticisme de base doit \u00e9galement pr\u00e9valoir pendant l&rsquo;entretien. Ne r\u00e9pondez pas \u00e0 des questions qui vous semblent trop confidentielles ou trop d\u00e9taill\u00e9es. Aucune entreprise s\u00e9rieuse ne vous demandera de lui fournir des mots de passe, des num\u00e9ros de tan, des num\u00e9ros de personnel, etc.           <\/p><h4><strong>Comment les employ\u00e9s peuvent-ils se prot\u00e9ger ?<\/strong><\/h4><p>Pour lutter contre les attaques de vishing et les \u00e9viter \u00e0 long terme, il est conseill\u00e9 de sensibiliser les collaborateurs. Une formation intensive vous permettra d&rsquo;attirer l&rsquo;attention de vos collaborateurs sur les dangers et de les sensibiliser aux m\u00e9thodes d&rsquo;attaque. Cela peut se faire soit par des vid\u00e9os de formation, soit par un atelier dans lequel les appels de vishing sont illustr\u00e9s et o\u00f9 les collaborateurs peuvent s&rsquo;entra\u00eener \u00e0 g\u00e9rer ce type d&rsquo;attaque.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7af6a55 e-flex e-con-boxed e-con e-parent\" data-id=\"7af6a55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ac479b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0ac479b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vishing Qu&rsquo;est-ce que le vishing ? Le vishing est une forme particuli\u00e8re de phishing. Ici aussi, l&rsquo;objectif est d&rsquo;inciter les personnes \u00e0 r\u00e9v\u00e9ler des informations sensibles ou confidentielles. Contrairement \u00e0 l&rsquo;hame\u00e7onnage \u00ab\u00a0traditionnel\u00a0\u00bb, o\u00f9 les victimes sont contact\u00e9es par e-mail, la prise de contact se fait par t\u00e9l\u00e9phone. D&rsquo;o\u00f9 le nom de \u00ab\u00a0vishing\u00a0\u00bb. Ici, le terme [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26043","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vishing - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/vishing\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vishing - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Vishing Qu&rsquo;est-ce que le vishing ? Le vishing est une forme particuli\u00e8re de phishing. Ici aussi, l&rsquo;objectif est d&rsquo;inciter les personnes \u00e0 r\u00e9v\u00e9ler des informations sensibles ou confidentielles. Contrairement \u00e0 l&rsquo;hame\u00e7onnage \u00ab\u00a0traditionnel\u00a0\u00bb, o\u00f9 les victimes sont contact\u00e9es par e-mail, la prise de contact se fait par t\u00e9l\u00e9phone. D&rsquo;o\u00f9 le nom de \u00ab\u00a0vishing\u00a0\u00bb. Ici, le terme [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/vishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-14T10:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T10:46:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Vishing\",\"datePublished\":\"2022-12-14T10:45:00+00:00\",\"dateModified\":\"2026-03-27T10:46:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/\"},\"wordCount\":975,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/\",\"name\":\"Vishing - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-12-14T10:45:00+00:00\",\"dateModified\":\"2026-03-27T10:46:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vishing - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/vishing\/","og_locale":"fr_FR","og_type":"article","og_title":"Vishing - Perseus Technologies","og_description":"Vishing Qu&rsquo;est-ce que le vishing ? Le vishing est une forme particuli\u00e8re de phishing. Ici aussi, l&rsquo;objectif est d&rsquo;inciter les personnes \u00e0 r\u00e9v\u00e9ler des informations sensibles ou confidentielles. Contrairement \u00e0 l&rsquo;hame\u00e7onnage \u00ab\u00a0traditionnel\u00a0\u00bb, o\u00f9 les victimes sont contact\u00e9es par e-mail, la prise de contact se fait par t\u00e9l\u00e9phone. D&rsquo;o\u00f9 le nom de \u00ab\u00a0vishing\u00a0\u00bb. Ici, le terme [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/vishing\/","og_site_name":"Perseus Technologies","article_published_time":"2022-12-14T10:45:00+00:00","article_modified_time":"2026-03-27T10:46:55+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/vishing\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/vishing\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Vishing","datePublished":"2022-12-14T10:45:00+00:00","dateModified":"2026-03-27T10:46:55+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/vishing\/"},"wordCount":975,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/vishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/vishing\/","url":"https:\/\/perseus.de\/fr\/vishing\/","name":"Vishing - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/vishing\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-12-14T10:45:00+00:00","dateModified":"2026-03-27T10:46:55+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/vishing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/vishing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/vishing\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/vishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Vishing"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26043"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26043\/revisions"}],"predecessor-version":[{"id":26044,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26043\/revisions\/26044"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}