{"id":27244,"date":"2021-08-18T16:52:00","date_gmt":"2021-08-18T14:52:00","guid":{"rendered":"https:\/\/perseus.de\/ingenierie-sociale-pirater-les-gens\/"},"modified":"2026-03-30T15:37:53","modified_gmt":"2026-03-30T13:37:53","slug":"ingenierie-sociale-pirater-les-gens","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/","title":{"rendered":"Ing\u00e9nierie sociale \u2013 Pirater les gens"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27244\" class=\"elementor elementor-27244 elementor-3446\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"512\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27243\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1-300x200.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dit image : Siavash Ghanbari via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3aa964d2 e-flex e-con-boxed e-con e-parent\" data-id=\"3aa964d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d35cbff e-con-full e-flex e-con e-child\" data-id=\"d35cbff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ceb4bf e-con-full e-flex e-con e-child\" data-id=\"0ceb4bf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6804876 elementor-widget elementor-widget-text-editor\" data-id=\"6804876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>18.08.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e29f2f0 elementor-widget elementor-widget-heading\" data-id=\"e29f2f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ing\u00e9nierie sociale \u2013 Pirater les gens<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c32000 elementor-widget elementor-widget-text-editor\" data-id=\"8c32000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Vecteurs d\u2019attaque | Le facteur humain | Pr\u00e9vention<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a4dc799 e-con-full e-flex e-con e-child\" data-id=\"a4dc799\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9ce1fe elementor-widget elementor-widget-text-editor\" data-id=\"d9ce1fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>La plupart des gens ont d\u00e9j\u00e0 entendu le terme \u00ab ing\u00e9nierie sociale \u00bb. Mais tr\u00e8s peu de gens peuvent imaginer quelque chose de concret \u00e0 ce sujet. Nous fournissons des informations !  <\/strong><\/p><p>En termes simples, l\u2019ing\u00e9nierie sociale signifie influencer ou tromper une personne. L\u2019ing\u00e9nierie sociale joue \u00e9galement un r\u00f4le majeur en s\u00e9curit\u00e9 informatique. <\/p><p><strong>Mais pourquoi ?<\/strong><\/p><p>Les hackers sont comme beaucoup de gens. Vous voulez obtenir le r\u00e9sultat maximal avec le moins d\u2019efforts possible. Les attaques contre les ordinateurs, syst\u00e8mes d\u2019exploitation ou r\u00e9seaux sont souvent complexes et tr\u00e8s \u00e9tendues. Si les cybercriminels ne peuvent pas exploiter les failles de s\u00e9curit\u00e9 existantes dans les logiciels et le mat\u00e9riel, ils doivent fournir beaucoup d\u2019efforts pour mener une attaque efficace contre une entreprise. D\u2019abord, il faut rep\u00e9rer une cible lucrative. Le pare-feu, le VPN et d\u2019autres m\u00e9canismes de protection doivent alors \u00eatre contourn\u00e9s. Il faut trouver des failles et des exploits et, au final, ils doivent fonctionner.      <\/p><p>La protection technique que les entreprises appliquent aujourd\u2019hui pour repousser les cyberattaques est relativement \u00e9lev\u00e9e. \u00c0 cet \u00e9gard, il est assez difficile pour les cybercriminels de surmonter les syst\u00e8mes et de p\u00e9n\u00e9trer l\u2019int\u00e9rieur de l\u2019informatique de l\u2019entreprise. Pour atteindre leur objectif, les hackers doivent utiliser des surfaces d\u2019attaque alternatives. L\u2019\u00eatre humain est dans la ligne de mire et sert de porte d\u2019entr\u00e9e id\u00e9ale. Compar\u00e9 \u00e0 la d\u00e9fense technique, il y a \u00e0 peine d\u2019investissement dans le facteur humain.    <\/p><p><strong> <\/strong><\/p><h4><strong>Le facteur humain comme risque de s\u00e9curit\u00e9<\/strong><\/h4><p>Les cybercriminels sont conscients de ce risque de s\u00e9curit\u00e9. Ils en profitent et ciblent les employ\u00e9s de l\u2019entreprise. Cela peut se faire directement par appel personnel ou indirectement par e-mail.  <\/p><p>Autre chose int\u00e9ressante : dans son <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-220-Milliarden-Euro-Schaden-pro-Jahr\">\u00e9tude<\/a> r\u00e9cemment publi\u00e9e, Bitkom confirme qu\u2019un grand nombre d\u2019attaques commencent par l\u2019ing\u00e9nierie sociale. 41 % des entreprises interrog\u00e9es ont d\u00e9clar\u00e9 qu\u2019il y avait eu de telles tentatives : 27 % des personnes interrog\u00e9es les ont contact\u00e9es par t\u00e9l\u00e9phone et 24 % par e-mail. <\/p><p>Mais l\u2019objectif est toujours le m\u00eame. Le pirate veut acc\u00e9der \u00e0 des donn\u00e9es sensibles, des documents et des informations (par exemple, les identifiants ou les coordonn\u00e9es bancaires) ou il souhaite entreprendre une action sp\u00e9cifique (par exemple, transf\u00e9rer une somme d\u2019argent)* <\/p><p><strong> <\/strong><\/p><h4><strong>Pourquoi l\u2019ing\u00e9nierie sociale fonctionne-t-elle ?<\/strong><\/h4><p>C\u2019est facile \u00e0 expliquer. Les cybercriminels utilisent des m\u00e9thodes famili\u00e8res pour manipuler les gens. L\u2019ing\u00e9nierie sociale est rencontr\u00e9e presque tous les jours. Que ce soit pour g\u00e9rer des amis, des membres de la famille ou m\u00eame des inconnus. Par des moyens rh\u00e9toriques ou diverses approches psychologiques, les gens peuvent \u00eatre guid\u00e9s et motiv\u00e9s \u00e0 se comporter d\u2019une certaine mani\u00e8re. L\u2019ing\u00e9nierie sociale peut \u00eatre d\u00e9crite comme une arme psychologique.     <\/p><p>Vous pouvez en savoir plus sur l\u2019influence du comportement humain dans le cadre de l\u2019ing\u00e9nierie <a href=\"https:\/\/www.informatik-aktuell.de\/betrieb\/sicherheit\/social-engineering-angriffe-und-die-psychologie-dahinter.html\">sociale ici <\/a>.<\/p><p>Ce faisant, l\u2019autre personne doit \u00eatre sp\u00e9cifiquement adress\u00e9e. Selon le personnage, il existe d\u2019autres incitations qui peuvent s\u00e9duire les hackers. Par exemple, un employ\u00e9 r\u00e9agit particuli\u00e8rement \u00e0 la flatterie, un autre \u00e0 une appr\u00e9ciation particuli\u00e8re et un autre encore \u00e0 la pression. Avec les bons stimuli, il est possible pour les cybercriminels d\u2019influencer les personnes afin d\u2019obtenir le r\u00e9sultat souhait\u00e9.   <\/p><p><strong> <\/strong><\/p><h4><strong>Le phishing, la forme la plus courante d\u2019ing\u00e9nierie sociale<\/strong><\/h4><p>En s\u00e9curit\u00e9 informatique, l\u2019ing\u00e9nierie sociale peut se manifester sous des formes tr\u00e8s diff\u00e9rentes qui ne pourraient pas \u00eatre plus diff\u00e9rentes. En plus du pr\u00e9texte, du jeu de queue ou de la fraude au PDG, le phishing** est l\u2019un des types les plus r\u00e9pandus. <\/p><p>Dans le phishing, les cybercriminels tentent d\u2019obtenir des informations sensibles et confidentielles \u00e0 l\u2019aide d\u2019e-mails, de faux sites web ou d\u2019autres moyens. Le phishing touche aussi les employ\u00e9s plus ou moins de mani\u00e8re personnelle. Les campagnes de phishing sont particuli\u00e8rement efficaces si le contenu de l\u2019email de phishing est adapt\u00e9 \u00e0 l\u2019destinataire ou si le destinataire se sent interpell\u00e9. Selon une \u00e9tude de la soci\u00e9t\u00e9 <a href=\"https:\/\/www.proofpoint.com\/uk\/resources\/threat-reports\/state-of-phish\">am\u00e9ricaine Proof Points<\/a>, les crochets suivants ont particuli\u00e8rement bien fonctionn\u00e9 en 2020\/2021 :   <\/p><ol><li>Campagnes de phishing concernant le Corona, le COVID-19 et les alertes sanitaires associ\u00e9es<\/li><li>Campagnes de phishing qui fournissent des informations sur les logiciels utilis\u00e9s dans l\u2019entreprise, par exemple Microsoft Exchange ou Outlook<\/li><li>Des campagnes de phishing qui offrent des avantages aux employ\u00e9s, par exemple un mois gratuit sur Netflix, ou des bons sur Amazon et Starbucks<\/li><\/ol><p>Les derniers mois l\u2019ont clairement montr\u00e9. La menace des attaques de phishing ne cesse d\u2019augmenter. Selon le rapport de l\u2019ENISA, le nombre d\u2019attaques de phishing par e-mail a augment\u00e9 de plus de 600 % en un mois au d\u00e9but de 2020. Perseus peut \u00e9galement confirmer que les attaques de phishing augmentent. Une \u00e9tude publi\u00e9e par Perseus \u00e0 la fin de l\u2019\u00e9t\u00e9 2020 montre que plus de la moiti\u00e9 des cyberattaques en 2020 \u00e9taient dues au phishing.    <\/p><p>Vous pouvez t\u00e9l\u00e9charger gratuitement l\u2019\u00e9tude compl\u00e8te sur la cybers\u00e9curit\u00e9 au bureau central ici.<\/p><p><strong> <\/strong><\/p><h4><strong>Comment les entreprises prot\u00e8gent-elles leurs employ\u00e9s ?<\/strong><\/h4><p>La protection durable contre l\u2019ing\u00e9nierie sociale et les attaques de phishing, entre autres, requiert, un concept de cybers\u00e9curit\u00e9 durable. Avec les m\u00eames ressources qu\u2019une entreprise consacre \u00e0 la d\u00e9fense technique, elle devrait aussi investir dans le \u00ab pare-feu humain \u00bb. Pers\u00e9e propose un tel programme de sensibilisation. Gr\u00e2ce \u00e0 une formation en ligne approfondie, des astuces utiles et, surtout, des simulations automatis\u00e9es d\u2019emails de phishing, les employ\u00e9s sont sp\u00e9cifiquement sensibilis\u00e9s aux sch\u00e9mas d\u2019attaque, form\u00e9s \u00e0 la gestion des emails de phishing, ce qui augmente de mani\u00e8re notable le niveau de cybers\u00e9curit\u00e9 de l\u2019entreprise.   <\/p><h6>* Source : Enqu\u00eate actuelle par Bitkom | Ao\u00fbt 2021. Vous pouvez trouver plus de <a href=\"https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-220-Milliarden-Euro-Schaden-pro-Jahr\">contenu ici<\/a>.<br>** Le terme phishing ici inclut \u00e9galement des sous-types tels que le spear phishing, le voice phishing \/ vishing, le smishing, les attaques sur les r\u00e9seaux sociaux, la compromission des emails professionnels, etc. <\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La plupart des gens ont d\u00e9j\u00e0 entendu le terme \u00ab ing\u00e9nierie sociale \u00bb. Mais tr\u00e8s peu de gens peuvent imaginer quelque chose de concret \u00e0 ce sujet. Nous fournissons des informations !  <\/p>\n","protected":false},"author":3,"featured_media":27243,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"La plupart des gens ont d\u00e9j\u00e0 entendu le terme \u00ab ing\u00e9nierie sociale \u00bb. Mais tr\u00e8s peu de gens peuvent imaginer quelque chose de concret \u00e0 ce sujet. Nous fournissons des informations !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T14:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:37:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Ing\u00e9nierie sociale \u2013 Pirater les gens\",\"datePublished\":\"2021-08-18T14:52:00+00:00\",\"dateModified\":\"2026-03-30T13:37:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/\"},\"wordCount\":1078,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/\",\"name\":\"Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"datePublished\":\"2021-08-18T14:52:00+00:00\",\"dateModified\":\"2026-03-30T13:37:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg\",\"width\":768,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/ingenierie-sociale-pirater-les-gens\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ing\u00e9nierie sociale \u2013 Pirater les gens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/","og_locale":"fr_FR","og_type":"article","og_title":"Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies","og_description":"La plupart des gens ont d\u00e9j\u00e0 entendu le terme \u00ab ing\u00e9nierie sociale \u00bb. Mais tr\u00e8s peu de gens peuvent imaginer quelque chose de concret \u00e0 ce sujet. Nous fournissons des informations !","og_url":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/","og_site_name":"Perseus Technologies","article_published_time":"2021-08-18T14:52:00+00:00","article_modified_time":"2026-03-30T13:37:53+00:00","og_image":[{"width":768,"height":512,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Ing\u00e9nierie sociale \u2013 Pirater les gens","datePublished":"2021-08-18T14:52:00+00:00","dateModified":"2026-03-30T13:37:53+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/"},"wordCount":1078,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/","url":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/","name":"Ing\u00e9nierie sociale \u2013 Pirater les gens - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","datePublished":"2021-08-18T14:52:00+00:00","dateModified":"2026-03-30T13:37:53+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Nervous_-via-Unsplash-Siavash-Ghanbari_A8UfuZ9hr1Q-768x512-1.jpg","width":768,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/ingenierie-sociale-pirater-les-gens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ing\u00e9nierie sociale \u2013 Pirater les gens"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27244"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27244\/revisions"}],"predecessor-version":[{"id":27245,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27244\/revisions\/27245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27243"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}