{"id":26049,"date":"2022-04-26T14:42:00","date_gmt":"2022-04-26T12:42:00","guid":{"rendered":"https:\/\/perseus.de\/programmes-malveillants-malware\/"},"modified":"2026-03-27T11:49:22","modified_gmt":"2026-03-27T10:49:22","slug":"programmes-malveillants-malware","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/","title":{"rendered":"Programmes malveillants (malware)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26049\" class=\"elementor elementor-26049 elementor-22556\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Programmes malveillants | <br> Malware<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d4fe3e e-flex e-con-boxed e-con e-parent\" data-id=\"0d4fe3e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-84f5a70 e-con-full e-flex e-con e-child\" data-id=\"84f5a70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e93776d elementor-widget elementor-widget-text-editor\" data-id=\"e93776d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Le terme est compos\u00e9 de \u00ab\u00a0mal\u00a0\u00bb pour \u00ab\u00a0mauvais, mauvais\u00a0\u00bb et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe donc un logiciel malveillant ; des termes tels que maliciel et programme malveillant sont \u00e9galement utilis\u00e9s comme synonymes. Les logiciels malveillants sont des termes g\u00e9n\u00e9riques d\u00e9signant, entre autres, les <a href=\"https:\/\/perseus.de\/2022\/04\/26\/virus-computervirus\/\">virus informatiques<\/a>, <a href=\"https:\/\/perseus.de\/2022\/04\/26\/trojaner\/\">les chevaux de Troie<\/a>, les <a href=\"https:\/\/perseus.de\/2022\/04\/25\/ransomware\/\">ransomwares<\/a>, les <a href=\"https:\/\/perseus.de\/2022\/04\/26\/wurm-computerwurm\/\">vers<\/a> et <a href=\"https:\/\/perseus.de\/2022\/04\/26\/spyware\/\">les logiciels espions<\/a>.  <\/p><h4> <\/h4><h4>Comment les logiciels malveillants fonctionnent-ils en d\u00e9tail ?<\/h4><p>Les attaques de logiciels malveillants repr\u00e9sentent la majorit\u00e9 des <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybervorfall\/\">cyberincidents survenant<\/a> dans les entreprises, soit 53 %, selon une enqu\u00eate men\u00e9e par l&rsquo;Office f\u00e9d\u00e9ral allemand de la s\u00e9curit\u00e9 des technologies de l&rsquo;information (BSI).<br>Il est int\u00e9ressant de noter que la grande majorit\u00e9 de ces logiciels malveillants &#8211; 90 % &#8211; sont diffus\u00e9s sous forme de lien ou de pi\u00e8ce jointe par courrier \u00e9lectronique.<br>On observe actuellement un nombre croissant d&rsquo;attaques cibl\u00e9es de logiciels malveillants sur les entreprises, souvent avec des intentions de chantage. Mais les attaquants peuvent aussi avoir pour objectif de s&#8217;emparer de donn\u00e9es sensibles, de brevets ou de contrats. <\/p><h4> <\/h4><h4>O\u00f9 est-ce que je rencontre le th\u00e8me \u00ab\u00a0malware\u00a0\u00bb dans mon travail quotidien ?<\/h4><p>Ce n&rsquo;est qu&rsquo;un des nombreux exemples possibles : L&rsquo;ouverture irr\u00e9fl\u00e9chie d&rsquo;une pr\u00e9tendue facture en pi\u00e8ce jointe d&rsquo;un e-mail peut entra\u00eener le chiffrement de tous les ordinateurs, serveurs et m\u00eame sauvegardes connect\u00e9s au r\u00e9seau de l&rsquo;entreprise et les rendre inutilisables. En cas de cyberincident, les logiciels malveillants peuvent avoir un impact diff\u00e9rent sur votre travail quotidien, selon leur type. Des documents peuvent dispara\u00eetre, des syst\u00e8mes peuvent \u00eatre endommag\u00e9s ou m\u00eame des donn\u00e9es sensibles peuvent \u00eatre transf\u00e9r\u00e9es de mani\u00e8re presque imperceptible. L&rsquo;objectif de l&rsquo;attaque peut \u00eatre, entre autres, d&rsquo;espionner votre entreprise, de la rendre inapte au travail ou de la faire chanter.   <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><p>Presque toutes les mesures qui r\u00e9duisent votre <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cyberrisiko\/\">cyber-risque<\/a> augmentent votre protection contre les attaques de logiciels malveillants.<br>Ces mesures sont nombreuses et doivent \u00eatre d\u00e9finies individuellement en fonction de l&rsquo;\u00e9valuation du cyber-risque de votre entreprise<br>Mais : presque toutes les mesures valent mieux que rien. Par exemple, la <a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">sensibilisation de vos collaborateurs<\/a> est indispensable, surtout si l&rsquo;on consid\u00e8re la proportion \u00e9lev\u00e9e de logiciels malveillants diffus\u00e9s par e-mail.<br>En cas d&rsquo;extorsion ou de perte de donn\u00e9es, vous devez effectuer des sauvegardes r\u00e9guli\u00e8res. Celles-ci (ou des copies) doivent \u00eatre stock\u00e9es hors ligne ou sur des r\u00e9seaux distincts afin de rester utilisables m\u00eame en cas d&rsquo;attaques cibl\u00e9es \u00e0 grande \u00e9chelle.  <\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c7ac54b e-flex e-con-boxed e-con e-parent\" data-id=\"c7ac54b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9db41a4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9db41a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Programmes malveillants | Malware Le terme est compos\u00e9 de \u00ab\u00a0mal\u00a0\u00bb pour \u00ab\u00a0mauvais, mauvais\u00a0\u00bb et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe donc un logiciel malveillant ; des termes tels que maliciel et programme malveillant sont \u00e9galement utilis\u00e9s comme synonymes. Les logiciels malveillants sont des termes g\u00e9n\u00e9riques d\u00e9signant, entre autres, les virus informatiques, les [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26049","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Programmes malveillants (malware) - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Programmes malveillants (malware) - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Programmes malveillants | Malware Le terme est compos\u00e9 de \u00ab\u00a0mal\u00a0\u00bb pour \u00ab\u00a0mauvais, mauvais\u00a0\u00bb et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe donc un logiciel malveillant ; des termes tels que maliciel et programme malveillant sont \u00e9galement utilis\u00e9s comme synonymes. Les logiciels malveillants sont des termes g\u00e9n\u00e9riques d\u00e9signant, entre autres, les virus informatiques, les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T12:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T10:49:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Programmes malveillants (malware)\",\"datePublished\":\"2022-04-26T12:42:00+00:00\",\"dateModified\":\"2026-03-27T10:49:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/\"},\"wordCount\":459,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/\",\"name\":\"Programmes malveillants (malware) - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-26T12:42:00+00:00\",\"dateModified\":\"2026-03-27T10:49:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/programmes-malveillants-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programmes malveillants (malware)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Programmes malveillants (malware) - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/","og_locale":"fr_FR","og_type":"article","og_title":"Programmes malveillants (malware) - Perseus Technologies","og_description":"Programmes malveillants | Malware Le terme est compos\u00e9 de \u00ab\u00a0mal\u00a0\u00bb pour \u00ab\u00a0mauvais, mauvais\u00a0\u00bb et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe donc un logiciel malveillant ; des termes tels que maliciel et programme malveillant sont \u00e9galement utilis\u00e9s comme synonymes. Les logiciels malveillants sont des termes g\u00e9n\u00e9riques d\u00e9signant, entre autres, les virus informatiques, les [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-26T12:42:00+00:00","article_modified_time":"2026-03-27T10:49:22+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Programmes malveillants (malware)","datePublished":"2022-04-26T12:42:00+00:00","dateModified":"2026-03-27T10:49:22+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/"},"wordCount":459,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/","url":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/","name":"Programmes malveillants (malware) - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-26T12:42:00+00:00","dateModified":"2026-03-27T10:49:22+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/programmes-malveillants-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Programmes malveillants (malware)"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26049"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26049\/revisions"}],"predecessor-version":[{"id":26050,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26049\/revisions\/26050"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}