{"id":27641,"date":"2020-07-20T16:35:00","date_gmt":"2020-07-20T14:35:00","guid":{"rendered":"https:\/\/perseus.de\/attention-vishing\/"},"modified":"2026-03-30T17:42:20","modified_gmt":"2026-03-30T15:42:20","slug":"attention-vishing","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/attention-vishing\/","title":{"rendered":"Attention, vishing !"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27641\" class=\"elementor elementor-27641 elementor-23221\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"730\" height=\"412\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27640\" alt=\"Fen\u00eatre d\u2019ordinateur portable\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg 730w, https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash-300x169.jpg 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source de l\u2019image : via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-54694a51 e-flex e-con-boxed e-con e-parent\" data-id=\"54694a51\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b3cc2ed e-con-full e-flex e-con e-child\" data-id=\"b3cc2ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-44d2782 e-con-full e-flex e-con e-child\" data-id=\"44d2782\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccd6aa7 elementor-widget elementor-widget-text-editor\" data-id=\"ccd6aa7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>28.07.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef6800c elementor-widget elementor-widget-heading\" data-id=\"ef6800c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Attention, vishing !<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78ffd8 elementor-widget elementor-widget-text-editor\" data-id=\"e78ffd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-faa955e e-con-full e-flex e-con e-child\" data-id=\"faa955e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfa560 elementor-widget elementor-widget-text-editor\" data-id=\"1dfa560\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Non, on n\u2019a pas fait d\u2019erreur. Il s\u2019agit en r\u00e9alit\u00e9 du soi-disant \u00ab vish \u00bb. Le vishing est une forme particuli\u00e8re de phishing. Il est compos\u00e9 de voix et de phishing. Tout comme la m\u00e9thode traditionnelle de phishing, des informations priv\u00e9es, sensibles ou confidentielles sont extraites d\u2019une personne en pr\u00e9tendant de fausses informations. Contrairement au phishing, cependant, la personne concern\u00e9e n\u2019est pas contact\u00e9e par e-mail, mais par t\u00e9l\u00e9phone.     <\/strong><\/p><p> <\/p><p>Ces derniers mois, le nombre de cyberattaques a consid\u00e9rablement augment\u00e9 et les cybercriminels comptent de plus en plus sur le vishing. La raison en est que les entreprises et leurs employ\u00e9s ont reconnu le danger pos\u00e9 par les attaques de phishing conventionnelles, et donc par les e-mails ou les faux sites web, et ont int\u00e9gr\u00e9 des mesures de pr\u00e9vention et des formations importantes dans leur travail quotidien. Les cybercriminels devront trouver de nouvelles m\u00e9thodes pour obtenir des informations sensibles de leurs victimes.  <\/p><p><strong>Quel est le danger ?<\/strong><\/p><p>Les soi-disant \u00ab Vishers \u00bb sont extr\u00eamement intelligents dans leurs attaques. Ils profitent de situations qui semblent normales et inoffensives aux yeux des humains. Les appels provenant de num\u00e9ros priv\u00e9s ou supprim\u00e9s ainsi que ceux d\u2019un centre d\u2019appels ou d\u2019une ligne d\u2019assistance client font presque partie de la routine quotidienne. Combien de fois avez-vous d\u00fb mentionner votre date de naissance, votre adresse ou simplement votre nom pour correspondre aux dates ? M\u00eame si ces appels sont souvent inoffensifs, la gestion quotidienne de ce type d\u2019appels garantit que les visiteurs ont souvent facilement acc\u00e8s \u00e0 des informations tr\u00e8s confidentielles.    <\/p><p><strong>Comment les cybercriminels s\u2019y prennent-ils ?<\/strong><\/p><p>Les cybercriminels se glissent dans diff\u00e9rents r\u00f4les. La Sparkasse met actuellement en garde contre des incidents de vishing. Ici, les escrocs se font passer pour des employ\u00e9s de la caisse d\u2019\u00e9pargne et demandent \u00e0 leurs victimes d\u2019annoncer leur num\u00e9ro de carte, leur num\u00e9ro de t\u00e9l\u00e9phone ou leurs TAN, qu\u2019elles re\u00e7oivent sur leur t\u00e9l\u00e9phone portable pendant l\u2019appel. Si jamais vous vous retrouvez dans une telle situation, coupez l\u2019appel et raccrochez imm\u00e9diatement. Aucune banque r\u00e9put\u00e9e ne vous demandera votre carte ou vos num\u00e9ros TAN par t\u00e9l\u00e9phone.    <\/p><p>Ou imaginez la situation suivante : le t\u00e9l\u00e9phone sonne et un professionnel informatique est \u00e0 l\u2019autre bout du fil et vous informe que votre ordinateur est infect\u00e9 par un virus. Il est d\u00e9sormais tr\u00e8s important de r\u00e9agir rapidement pour emp\u00eacher le virus de paralyser l\u2019ensemble du r\u00e9seau de l\u2019entreprise. L\u2019expert informatique souhaite effectuer une maintenance \u00e0 distance avec vous afin d\u2019installer le logiciel de diagnostic n\u00e9cessaire sur votre ordinateur et ainsi pouvoir r\u00e9soudre le probl\u00e8me. Cependant, il a besoin de ton mot de passe pour \u00e7a.   <\/p><p>Comme dans le phishing traditionnel, les auteurs jouent sur les \u00e9motions de leurs victimes en manipulant la situation en leur faveur. D\u2019abord, la confiance se construit. Cette confiance est cr\u00e9\u00e9e par le fait que l\u2019auteur appara\u00eet dans un r\u00f4le dont l\u2019autorit\u00e9 n\u2019est souvent pas remise en question, par exemple celle d\u2019un policier, d\u2019un employ\u00e9 de banque ou d\u2019un expert en informatique. Si la confiance cr\u00e9\u00e9e ne suffit pas \u00e0 obtenir les informations souhait\u00e9es, les victimes sont mises sous pression en d\u00e9clenchant la peur et la panique. Cela encourage les personnes concern\u00e9es \u00e0 agir de mani\u00e8re impulsive et pr\u00e9cipit\u00e9e.    <\/p><p><strong>Que pouvez-vous faire pour vous prot\u00e9ger contre le vishing ?<\/strong><\/p><p>Une bonne dose de m\u00e9fiance n\u2019est jamais une erreur. Interrogez l\u2019appelant, peu importe l\u2019officiellit\u00e9 de l\u2019endroit d\u2019o\u00f9 il appelle. Faire des coups de c\u0153ur essaie tout pour vous bercer dans un sentiment de s\u00e9curit\u00e9 et obtenir des informations confidentielles en chemin. Prot\u00e8ge-toi en contactant une autre personne qui peut confirmer le cas ou la pr\u00e9occupation. La pr\u00e9vention vaut mieux que la gu\u00e9rison ! En g\u00e9n\u00e9ral, cependant, ce qui suit s\u2019applique : ne jamais partager d\u2019informations confidentielles telles que les d\u00e9tails de compte, les codes PIN ou les mots de passe sur le t\u00e9l\u00e9phone.     <\/p><p><strong>Quelle est la bonne chose \u00e0 faire si vous avez transmis des informations sensibles ?<\/strong><\/p><p>Si vous tombez dans une attaque de vishing, vous devez agir rapidement mais prudemment. Agir de mani\u00e8re pr\u00e9cipit\u00e9e peut causer d\u2019autres d\u00e9g\u00e2ts. Informez imm\u00e9diatement votre service informatique des informations que vous avez partag\u00e9es. Si vous avez transmis des mots de passe, changez-les imm\u00e9diatement. Si vous utilisez l\u2019un des mots de passe \u00e9mis pour plusieurs programmes ou applications, changez \u00e9galement le mot de passe pour ces services. Il est important que vous n\u2019utilisiez pas ce mot de passe compromis \u00e0 l\u2019avenir     <\/p><p>Si vous avez des questions sur les mots de passe, Perseus peut vous aider. Lisez ici des articles d\u00e9taill\u00e9s sur <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/passwortsicherheit\/\">la s\u00e9curit\u00e9 des mots de passe<\/a> et le <a href=\"http:\/\/52.57.197.213\/2022\/04\/22\/passwort-manager\/\">gestionnaire de mots<\/a> de passe. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Source de l\u2019image : via Unsplash 28.07.2020 Attention, vishing ! Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 Non, on n\u2019a pas fait d\u2019erreur. Il s\u2019agit en r\u00e9alit\u00e9 du soi-disant \u00ab vish \u00bb. Le vishing est une forme particuli\u00e8re de phishing. Il est compos\u00e9 de voix et de phishing. Tout comme la m\u00e9thode traditionnelle de phishing, des informations [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":27640,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attention, vishing ! - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/attention-vishing\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attention, vishing ! - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Source de l\u2019image : via Unsplash 28.07.2020 Attention, vishing ! Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 Non, on n\u2019a pas fait d\u2019erreur. Il s\u2019agit en r\u00e9alit\u00e9 du soi-disant \u00ab vish \u00bb. Le vishing est une forme particuli\u00e8re de phishing. Il est compos\u00e9 de voix et de phishing. Tout comme la m\u00e9thode traditionnelle de phishing, des informations [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/attention-vishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-20T14:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T15:42:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasia Pamoukis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasia Pamoukis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/\"},\"author\":{\"name\":\"Anastasia Pamoukis\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\"},\"headline\":\"Attention, vishing !\",\"datePublished\":\"2020-07-20T14:35:00+00:00\",\"dateModified\":\"2026-03-30T15:42:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/\"},\"wordCount\":872,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Blog-Header-Vishing-Unsplash.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/\",\"name\":\"Attention, vishing ! - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Blog-Header-Vishing-Unsplash.jpg\",\"datePublished\":\"2020-07-20T14:35:00+00:00\",\"dateModified\":\"2026-03-30T15:42:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Blog-Header-Vishing-Unsplash.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Blog-Header-Vishing-Unsplash.jpg\",\"width\":730,\"height\":412,\"caption\":\"Fen\u00eatre d\u2019ordinateur portable\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/attention-vishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attention, vishing !\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/6c87a2feea6439d0ead16c8f0f07e40b\",\"name\":\"Anastasia Pamoukis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g\",\"caption\":\"Anastasia Pamoukis\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/anastasia-pamoukis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention, vishing ! - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/attention-vishing\/","og_locale":"fr_FR","og_type":"article","og_title":"Attention, vishing ! - Perseus Technologies","og_description":"Source de l\u2019image : via Unsplash 28.07.2020 Attention, vishing ! Cybers\u00e9curit\u00e9 | Hacker | Cybercriminalit\u00e9 Non, on n\u2019a pas fait d\u2019erreur. Il s\u2019agit en r\u00e9alit\u00e9 du soi-disant \u00ab vish \u00bb. Le vishing est une forme particuli\u00e8re de phishing. Il est compos\u00e9 de voix et de phishing. Tout comme la m\u00e9thode traditionnelle de phishing, des informations [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/attention-vishing\/","og_site_name":"Perseus Technologies","article_published_time":"2020-07-20T14:35:00+00:00","article_modified_time":"2026-03-30T15:42:20+00:00","og_image":[{"width":730,"height":412,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg","type":"image\/jpeg"}],"author":"Anastasia Pamoukis","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Anastasia Pamoukis","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/"},"author":{"name":"Anastasia Pamoukis","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b"},"headline":"Attention, vishing !","datePublished":"2020-07-20T14:35:00+00:00","dateModified":"2026-03-30T15:42:20+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/"},"wordCount":872,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/attention-vishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/attention-vishing\/","url":"https:\/\/perseus.de\/fr\/attention-vishing\/","name":"Attention, vishing ! - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg","datePublished":"2020-07-20T14:35:00+00:00","dateModified":"2026-03-30T15:42:20+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/attention-vishing\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2020\/07\/Blog-Header-Vishing-Unsplash.jpg","width":730,"height":412,"caption":"Fen\u00eatre d\u2019ordinateur portable"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/attention-vishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Attention, vishing !"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/6c87a2feea6439d0ead16c8f0f07e40b","name":"Anastasia Pamoukis","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/88febef1895859fc3a543c774ae6bc44cde0f02199f7f792af67eaf196406342?s=96&d=mm&r=g","caption":"Anastasia Pamoukis"},"sameAs":["https:\/\/perseus.de"],"url":"https:\/\/perseus.de\/fr\/author\/anastasia-pamoukis\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27641"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27641\/revisions"}],"predecessor-version":[{"id":27642,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27641\/revisions\/27642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27640"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}