{"id":27322,"date":"2021-05-20T16:46:00","date_gmt":"2021-05-20T14:46:00","guid":{"rendered":"https:\/\/perseus.de\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/"},"modified":"2026-03-30T16:07:29","modified_gmt":"2026-03-30T14:07:29","slug":"les-smartphones-comme-passerelle-intelligente-pour-les-hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/","title":{"rendered":"Les smartphones comme passerelle intelligente pour les hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27322\" class=\"elementor elementor-27322 elementor-22631\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"339\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27321\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1-300x170.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dit image : Maxim Ilyahov via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0be203 e-flex e-con-boxed e-con e-parent\" data-id=\"e0be203\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b5130da e-con-full e-flex e-con e-child\" data-id=\"b5130da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ab2847 e-con-full e-flex e-con e-child\" data-id=\"0ab2847\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f21d3a9 elementor-widget elementor-widget-text-editor\" data-id=\"f21d3a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>20.05.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f3e0d0 elementor-widget elementor-widget-heading\" data-id=\"7f3e0d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Les smartphones comme passerelle intelligente pour les hackers\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b5dd52 elementor-widget elementor-widget-text-editor\" data-id=\"1b5dd52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Protection informatique | Vecteurs d\u2019attaque<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7cfc3e3 e-con-full e-flex e-con e-child\" data-id=\"7cfc3e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6039b8 elementor-widget elementor-widget-text-editor\" data-id=\"a6039b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Depuis un certain temps d\u00e9j\u00e0, les cybercriminels identifient et exploitent les appareils mobiles comme des points d\u2019entr\u00e9e suppos\u00e9s faciles pour leurs attaques pr\u00e9vues. R\u00e9cemment, Perseus a \u00e9galement d\u00fb de plus en plus avertir ses clients de telles attaques. Un aper\u00e7u.  <\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>Indice de s\u00e9curit\u00e9 mobile de Verizon<\/strong><\/p>\n<p>La soci\u00e9t\u00e9 de t\u00e9l\u00e9communications Verizon publie r\u00e9guli\u00e8rement l&rsquo;\u00ab Mobile Security Index \u00bb. Comme son nom l\u2019indique, le rapport se concentre exclusivement sur les menaces pesant sur les appareils mobiles. Il explique quelles mesures de protection les entreprises utilisent pour se prot\u00e9ger contre d\u2019\u00e9ventuelles attaques. Enfin, il expliquait aussi \u00e0 quel point ces mesures \u00e9chouent malheureusement et entra\u00eenent des compromis sur les appareils mobiles.   <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>La menace augmente<\/strong><\/p>\n<p>Les menaces pesant sur les appareils mobiles, tels que les smartphones, tablettes et ordinateurs portables, augmentent consid\u00e9rablement. Deux cinqui\u00e8mes des r\u00e9pondants ont d\u00e9clar\u00e9 consid\u00e9rer que les appareils mobiles repr\u00e9sentent la plus grande menace \u00e0 la s\u00e9curit\u00e9 informatique pour l\u2019organisation. Parmi les autres, 85 % ont d\u00e9clar\u00e9 que les appareils mobiles sont au moins aussi vuln\u00e9rables que les autres syst\u00e8mes informatiques.  <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>C\u2019est pourquoi les appareils mobiles sont vuln\u00e9rables<\/strong><\/p>\n<p>Bien que le nombre de violations de mobile n\u2019ait pas augment\u00e9 cette ann\u00e9e, l\u2019ampleur reste alarmante. Plus d\u2019une entreprise sur cinq interrog\u00e9e avait subi un incident de s\u00e9curit\u00e9 li\u00e9 \u00e0 un appareil mobile au cours des 12 mois pr\u00e9c\u00e9dents. <\/p>\n<p>La raison en est que les appareils mobiles sont utilis\u00e9s universellement. On ne peut pas dire que la fr\u00e9quence d\u2019utilisation a augment\u00e9, mais plut\u00f4t l\u2019\u00e9tendue de son usage. Les utilisateurs ont l\u2019habitude d\u2019accomplir toutes les t\u00e2ches avec des appareils mobiles \u2013 en particulier les smartphones. Les appareils mobiles sont pass\u00e9s d\u2019un compagnon pratique \u00e0 un outil professionnel indispensable.   <\/p>\n<p>L\u2019avancement de la num\u00e9risation et les nouvelles innovations technologiques rendent le travail des experts en informatique plus difficile. Selon Verizon, la pression de l\u2019entreprise sur l\u2019informatique augmente. Plus de 75 % des prestataires de services informatiques ont \u00e9t\u00e9 invit\u00e9s par la direction \u00e0 sacrifier la s\u00e9curit\u00e9 des appareils mobiles afin de respecter des d\u00e9lais fix\u00e9s ou d\u2019autres objectifs commerciaux.  <\/p>\n<p>De plus, les cybercriminels travaillent de plus en plus professionnellement. Les attaques deviennent plus \u00e9tendues, plus complexes et plus complexes. Les cybercriminels sont de plus en plus capables de d\u00e9velopper des attaques de phishing cibl\u00e9es et d\u2019attaquer leurs victimes, par exemple. Souvent, ces attaques sont plus efficaces sur les appareils mobiles. Les e-mails malveillants ou les faux sites web sont d\u00e9tect\u00e9s moins rapidement sur un petit \u00e9cran que sur d\u2019autres appareils.    <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>L\u2019influence du Covid-19<\/strong><\/p>\n<p>L\u2019influence du Covid-19 ne doit pas non plus \u00eatre sous-estim\u00e9e. Les entreprises envoyaient leurs employ\u00e9s travailler de chez eux toute la nuit. Travailler entre ses quatre murs \u00e9tait plut\u00f4t l\u2019exception avant la pand\u00e9mie. C\u2019est d\u00e9sormais la nouvelle norme et cela le restera \u00e0 l\u2019avenir. Cependant, selon le rapport de Verizon, un quart des r\u00e9pondants ont d\u00e9clar\u00e9 que leur organisation avait n\u00e9glig\u00e9 la s\u00e9curit\u00e9 des appareils mobiles pour permettre un travail efficace \u00e0 domicile. Parall\u00e8lement, la soi-disant informatique fant\u00f4me peut \u00e9merger dans l\u2019entreprise. Cela se produit lorsque les employ\u00e9s utilisent des programmes ou des appareils priv\u00e9s en lien avec les donn\u00e9es de l\u2019entreprise. Cela comporte certains risques, car l\u2019IT de l\u2019entreprise ou l\u2019expert IT responsable n\u2019a aucune influence sur l\u2019utilisation ou le d\u00e9ploiement des programmes et appareils et ne peut pas comprendre si la main-de travail respecte les r\u00e9glementations et processus d\u00e9finis.      <\/p>\n<p>Vous pouvez trouver plus d\u2019informations sur l\u2019informatique parall\u00e8le ici.<\/p>\n<p>De plus, le Covid-19 a \u00e9t\u00e9 exploit\u00e9 par les cybercriminels pour cr\u00e9er de plus en plus de campagnes de phishing.&nbsp;  Les r\u00e9glementations, lois et r\u00e9glementations en constante \u00e9volution ont fourni suffisamment de mati\u00e8re pour que les hackers cr\u00e9ent rapidement des attaques de phishing sur mesure.<\/p>\n<p><strong><br><\/strong><\/p><p><strong>Exemples actuels<\/strong><\/p>\n<p>Perseus a \u00e9galement constat\u00e9 une augmentation des cyberattaques sur les appareils mobiles. Ces derni\u00e8res semaines, l\u2019\u00e9quipe Perseus a envoy\u00e9 plusieurs alertes de danger \u00e0 ses clients pour signaler les menaces actuelles sur les appareils mobiles. <\/p>\n<ol>\n<li>Le 4 mai, Apple et Android ont demand\u00e9 \u00e0 leurs utilisateurs d\u2019installer des mises \u00e0 jour de s\u00e9curit\u00e9 importantes au fur et \u00e0 mesure que diverses vuln\u00e9rabilit\u00e9s \u00e9taient d\u00e9couvertes. Dans le cas d\u2019Android, l\u2019\u00e9l\u00e9ment concern\u00e9 \u00e9tait le syst\u00e8me d\u2019exploitation Android de Google, une plateforme open source pour appareils mobiles. Si cela est exploit\u00e9 avec succ\u00e8s, un attaquant distant et anonyme pourrait ex\u00e9cuter un code de programme arbitraire avec des privil\u00e8ges administrateur, augmenter ses privil\u00e8ges, divulguer des informations et contourner les mesures de s\u00e9curit\u00e9, c\u2019est-\u00e0-dire obtenir un contr\u00f4le quasi total sur l\u2019appareil br\u00e8ch\u00e9. Les vuln\u00e9rabilit\u00e9s sur les appareils Apple \u00e9taient d\u00e9j\u00e0 activement exploit\u00e9es lorsque l\u2019incident a \u00e9t\u00e9 annonc\u00e9. Les vuln\u00e9rabilit\u00e9s attaqu\u00e9es \u00e9taient localis\u00e9es dans le moteur Webkit, qui sert \u00e0 afficher des sites web dans les navigateurs web.    <\/li>\n<li>Le 9 avril, Perseus a averti ses clients d\u2019une campagne SMS malveillante. Les cybercriminels se faisaient passer pour des livreurs de colis et envoyaient \u00e0 leurs victimes des messages faussement r\u00e9els avec un faux lien pour une suppos\u00e9e livraison de colis. Les auteurs semblent instrumentaliser la pand\u00e9mie actuelle de coronavirus, durant laquelle les commandes sont de plus en plus pass\u00e9es en ligne et o\u00f9 de nombreuses personnes attendent des colis. L\u2019objectif \u00e9tait d\u2019intercepter les donn\u00e9es personnelles des consommateurs ou d\u2019installer des logiciels malveillants.   <\/li>\n<li>Et la semaine derni\u00e8re encore, Perseus a rapport\u00e9 sur le malware \u00ab TeaBot \u00bb, qui tente d\u2019espionner les donn\u00e9es bancaires sur des appareils Android. Lisez l\u2019avertissement de danger actuel &nbsp;<a href=\"http:\/\/52.57.197.213\/2021\/05\/18\/schadsoftware-teabot-versucht-bankdaten-auf-android-geraeten-auszuspionieren\/\">Tiens<\/a>.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cr\u00e9dit image : Maxim Ilyahov via Unsplash 20.05.2021 Les smartphones comme passerelle intelligente pour les hackers Cybers\u00e9curit\u00e9 | Protection informatique | Vecteurs d\u2019attaque Depuis un certain temps d\u00e9j\u00e0, les cybercriminels identifient et exploitent les appareils mobiles comme des points d\u2019entr\u00e9e suppos\u00e9s faciles pour leurs attaques pr\u00e9vues. R\u00e9cemment, Perseus a \u00e9galement d\u00fb de plus en plus [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":27321,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cr\u00e9dit image : Maxim Ilyahov via Unsplash 20.05.2021 Les smartphones comme passerelle intelligente pour les hackers Cybers\u00e9curit\u00e9 | Protection informatique | Vecteurs d\u2019attaque Depuis un certain temps d\u00e9j\u00e0, les cybercriminels identifient et exploitent les appareils mobiles comme des points d\u2019entr\u00e9e suppos\u00e9s faciles pour leurs attaques pr\u00e9vues. R\u00e9cemment, Perseus a \u00e9galement d\u00fb de plus en plus [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T14:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:07:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Les smartphones comme passerelle intelligente pour les hackers\",\"datePublished\":\"2021-05-20T14:46:00+00:00\",\"dateModified\":\"2026-03-30T14:07:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/\"},\"wordCount\":1033,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/\",\"name\":\"Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"datePublished\":\"2021-05-20T14:46:00+00:00\",\"dateModified\":\"2026-03-30T14:07:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"width\":600,\"height\":339},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les smartphones comme passerelle intelligente pour les hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/","og_locale":"fr_FR","og_type":"article","og_title":"Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies","og_description":"Cr\u00e9dit image : Maxim Ilyahov via Unsplash 20.05.2021 Les smartphones comme passerelle intelligente pour les hackers Cybers\u00e9curit\u00e9 | Protection informatique | Vecteurs d\u2019attaque Depuis un certain temps d\u00e9j\u00e0, les cybercriminels identifient et exploitent les appareils mobiles comme des points d\u2019entr\u00e9e suppos\u00e9s faciles pour leurs attaques pr\u00e9vues. R\u00e9cemment, Perseus a \u00e9galement d\u00fb de plus en plus [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2021-05-20T14:46:00+00:00","article_modified_time":"2026-03-30T14:07:29+00:00","og_image":[{"width":600,"height":339,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Les smartphones comme passerelle intelligente pour les hackers","datePublished":"2021-05-20T14:46:00+00:00","dateModified":"2026-03-30T14:07:29+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/"},"wordCount":1033,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/","url":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/","name":"Les smartphones comme passerelle intelligente pour les hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","datePublished":"2021-05-20T14:46:00+00:00","dateModified":"2026-03-30T14:07:29+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","width":600,"height":339},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/les-smartphones-comme-passerelle-intelligente-pour-les-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Les smartphones comme passerelle intelligente pour les hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27322"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27322\/revisions"}],"predecessor-version":[{"id":27323,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27322\/revisions\/27323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27321"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}