{"id":26187,"date":"2022-04-26T12:22:00","date_gmt":"2022-04-26T10:22:00","guid":{"rendered":"https:\/\/perseus.de\/logiciels-espions-spyware\/"},"modified":"2026-03-27T12:18:23","modified_gmt":"2026-03-27T11:18:23","slug":"logiciels-espions-spyware","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/","title":{"rendered":"Logiciels espions (Spyware)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26187\" class=\"elementor elementor-26187 elementor-22493\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Logiciels espions (Spyware)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c999b76 e-flex e-con-boxed e-con e-parent\" data-id=\"c999b76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c584180 e-con-full e-flex e-con e-child\" data-id=\"c584180\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61bc7fa elementor-widget elementor-widget-text-editor\" data-id=\"61bc7fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Le terme est compos\u00e9 du mot anglais \u00ab\u00a0spy\u00a0\u00bb (espion, espionner) et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe les programmes qui espionnent les donn\u00e9es d&rsquo;un utilisateur ou d&rsquo;un ordinateur et les envoient \u00e0 des tiers. Les traductions fran\u00e7aises du terme \u00ab\u00a0spyware\u00a0\u00bb sont notamment \u00ab\u00a0Schn\u00fcffelsoftware\u00a0\u00bb, \u00ab\u00a0Sp\u00e4hprogramm\u00a0\u00bb et \u00ab\u00a0Spionagesoftware\u00a0\u00bb.  <\/p><h4>Que signifie le terme spyware en d\u00e9tail ?<\/h4><p>Les logiciels espions sont souvent utilis\u00e9s pour espionner le comportement des utilisateurs sur Internet. Ces donn\u00e9es sont ensuite utilis\u00e9es pour s\u00e9lectionner et afficher des publicit\u00e9s en ligne, par exemple. Le contexte est le suivant : plus la publicit\u00e9 en ligne est cibl\u00e9e, plus les espaces publicitaires correspondants peuvent \u00eatre vendus \u00e0 un prix \u00e9lev\u00e9. Pratiquement toute information suppl\u00e9mentaire sur un utilisateur se traduit par un prix plus \u00e9lev\u00e9. Les logiciels espions sont souvent inclus dans des logiciels gratuits, tels que des \u00e9conomiseurs d&rsquo;\u00e9cran ou des programmes suppl\u00e9mentaires. Les informations sont souvent cach\u00e9es dans les conditions de licence, par exemple sous la forme de \u00ab\u00a0fonctions de communication automatique\u00a0\u00bb. Les logiciels espions peuvent \u00e9galement \u00eatre diffus\u00e9s par des <a href=\"https:\/\/perseus.de\/2022\/04\/26\/wurm-computerwurm\/\">vers<\/a> et <a href=\"https:\/\/perseus.de\/2022\/04\/26\/trojaner\/\">des chevaux de Troie<\/a> ou s&rsquo;introduire dans un syst\u00e8me informatique par le biais de failles de s\u00e9curit\u00e9. Les r\u00e9gimes autoritaires utilisent parfois ces moyens pour espionner les dissidents politiques. De nombreux logiciels espions sont techniquement tr\u00e8s sophistiqu\u00e9s, ce qui les rend particuli\u00e8rement difficiles \u00e0 supprimer.        <\/p><h4>O\u00f9 puis-je rencontrer des logiciels espions dans mon travail quotidien ?<\/h4><p>Dans votre travail quotidien, vous pouvez remarquer les logiciels espions gr\u00e2ce \u00e0 des publicit\u00e9s en ligne cibl\u00e9es. Par exemple, des produits que vous avez d\u00e9j\u00e0 consult\u00e9s dans une boutique en ligne vous sont pr\u00e9sent\u00e9s. Ou votre ordinateur fonctionne plus lentement que d&rsquo;habitude, en particulier lorsque vous naviguez sur Internet. Pour \u00e9viter que des donn\u00e9es sensibles de votre entreprise ne soient espionn\u00e9es en plus de vos donn\u00e9es d&rsquo;utilisateur, vous devriez alors contr\u00f4ler ou faire contr\u00f4ler votre ordinateur \u00e0 la recherche de logiciels espions.   <\/p><h4>Que puis-je faire pour me prot\u00e9ger des logiciels espions ?<\/h4><p>Vous pouvez prendre les mesures suivantes pour vous prot\u00e9ger contre les logiciels espions :<\/p><ul><li>D\u00e9sactiver l&rsquo;ex\u00e9cution de contenus actifs (par ex. Adobe Flash, Java) dans le navigateur<\/li><li>N&rsquo;acceptez pas les cookies, et si vous le faites, uniquement ceux des sites visit\u00e9s.<\/li><li>En outre, toutes les mesures de <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybersicherheit\/\">cybers\u00e9curit\u00e9<\/a> g\u00e9n\u00e9rale, y compris une tr\u00e8s bonne <a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\">hygi\u00e8ne de mise \u00e0 jour<\/a>, l&rsquo;utilisation de pare-feu et de logiciels antivirus, une gestion intelligente des droits d&rsquo;administrateur, une protection critique des donn\u00e9es et une protection contre les virus.<\/li><li>V\u00e9rification des liens et des pi\u00e8ces jointes des e-mails, etc.<\/li><\/ul><p><strong>Attention ! <\/strong>Si, en surfant sur Internet, vous recevez un avertissement indiquant que votre ordinateur est infect\u00e9 par un <a href=\"https:\/\/perseus.de\/2022\/04\/26\/virus-computervirus\/\">virus<\/a>, un logiciel espion ou autre, ignorez-le. Surtout si un programme est propos\u00e9 pour \u00e9liminer la pr\u00e9tendue infection. Ironiquement, il s&rsquo;agit probablement d&rsquo;un <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">logiciel malveillant<\/a>. Analysez votre ordinateur, mais toujours avec des programmes dont vous connaissez l&rsquo;origine sans aucun doute.   <\/p><p>En cas d&rsquo;infection pr\u00e9sum\u00e9e En raison du niveau technique \u00e9lev\u00e9 de nombreux logiciels espions, nous vous recommandons d&rsquo;utiliser des programmes sp\u00e9ciaux pour d\u00e9tecter et \u00e9liminer les logiciels espions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3d7362 e-flex e-con-boxed e-con e-parent\" data-id=\"d3d7362\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-776821a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"776821a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Logiciels espions (Spyware) Le terme est compos\u00e9 du mot anglais \u00ab\u00a0spy\u00a0\u00bb (espion, espionner) et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe les programmes qui espionnent les donn\u00e9es d&rsquo;un utilisateur ou d&rsquo;un ordinateur et les envoient \u00e0 des tiers. Les traductions fran\u00e7aises du terme \u00ab\u00a0spyware\u00a0\u00bb sont notamment \u00ab\u00a0Schn\u00fcffelsoftware\u00a0\u00bb, \u00ab\u00a0Sp\u00e4hprogramm\u00a0\u00bb et \u00ab\u00a0Spionagesoftware\u00a0\u00bb. Que signifie le [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26187","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Logiciels espions (Spyware) - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logiciels espions (Spyware) - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Logiciels espions (Spyware) Le terme est compos\u00e9 du mot anglais \u00ab\u00a0spy\u00a0\u00bb (espion, espionner) et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe les programmes qui espionnent les donn\u00e9es d&rsquo;un utilisateur ou d&rsquo;un ordinateur et les envoient \u00e0 des tiers. Les traductions fran\u00e7aises du terme \u00ab\u00a0spyware\u00a0\u00bb sont notamment \u00ab\u00a0Schn\u00fcffelsoftware\u00a0\u00bb, \u00ab\u00a0Sp\u00e4hprogramm\u00a0\u00bb et \u00ab\u00a0Spionagesoftware\u00a0\u00bb. Que signifie le [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-26T10:22:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-27T11:18:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Logiciels espions (Spyware)\",\"datePublished\":\"2022-04-26T10:22:00+00:00\",\"dateModified\":\"2026-03-27T11:18:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/\",\"name\":\"Logiciels espions (Spyware) - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-26T10:22:00+00:00\",\"dateModified\":\"2026-03-27T11:18:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/logiciels-espions-spyware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logiciels espions (Spyware)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logiciels espions (Spyware) - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/","og_locale":"fr_FR","og_type":"article","og_title":"Logiciels espions (Spyware) - Perseus Technologies","og_description":"Logiciels espions (Spyware) Le terme est compos\u00e9 du mot anglais \u00ab\u00a0spy\u00a0\u00bb (espion, espionner) et de la partie \u00ab\u00a0-ware\u00a0\u00bb du mot logiciel. Il d\u00e9signe les programmes qui espionnent les donn\u00e9es d&rsquo;un utilisateur ou d&rsquo;un ordinateur et les envoient \u00e0 des tiers. Les traductions fran\u00e7aises du terme \u00ab\u00a0spyware\u00a0\u00bb sont notamment \u00ab\u00a0Schn\u00fcffelsoftware\u00a0\u00bb, \u00ab\u00a0Sp\u00e4hprogramm\u00a0\u00bb et \u00ab\u00a0Spionagesoftware\u00a0\u00bb. Que signifie le [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-26T10:22:00+00:00","article_modified_time":"2026-03-27T11:18:23+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Logiciels espions (Spyware)","datePublished":"2022-04-26T10:22:00+00:00","dateModified":"2026-03-27T11:18:23+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/","url":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/","name":"Logiciels espions (Spyware) - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-26T10:22:00+00:00","dateModified":"2026-03-27T11:18:23+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/logiciels-espions-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Logiciels espions (Spyware)"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26187"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26187\/revisions"}],"predecessor-version":[{"id":26188,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26187\/revisions\/26188"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}