{"version":"1.0","provider_name":"APTITUDE INFORMATIQUE","provider_url":"https:\/\/www.aptitude-informatique.fr","author_name":"yann Le Goc","author_url":"https:\/\/www.aptitude-informatique.fr\/index.php\/author\/yann\/","title":"Cyberattaques - APTITUDE INFORMATIQUE","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UBpkvjb0AH\"><a href=\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/\">Cyberattaques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.aptitude-informatique.fr\/index.php\/2017\/11\/15\/cyberattaques\/embed\/#?secret=UBpkvjb0AH\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Cyberattaques\u00a0\u00bb &#8212; APTITUDE INFORMATIQUE\" data-secret=\"UBpkvjb0AH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i0.wp.com\/www.aptitude-informatique.fr\/wp-content\/uploads\/2017\/11\/cyber-e1510757137263.png?fit=120%2C120&ssl=1","thumbnail_width":120,"thumbnail_height":120,"description":"CCleaner infect\u00e9 par un logiciel malveillant CCleaner a \u00e9t\u00e9 compromis par un logiciel malveillant. 2,27 millions de personnes ont t\u00e9l\u00e9charg\u00e9 les versions infect\u00e9es. Bien que cette cyberattaque ait atteint des milliers de machines, il semblerait que le groupe de cybercriminels ciblait majoritairement des entreprises technologiques. Parmi elles figurent Sony, Epson, Samsung ou encore Google."}