{"version":"1.0","provider_name":"Solutions-informatique-haguenau","provider_url":"https:\/\/solutions-informatique-haguenau.fr","author_name":"solutions-informatique-haguenau.fr","author_url":"https:\/\/solutions-informatique-haguenau.fr\/index.php\/author\/solutions-informatique-haguenau-fr\/","title":"Phishing : Reconna\u00eetre les Arnaques - Solutions-informatique-haguenau","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2aNGr2cgHu\"><a href=\"https:\/\/solutions-informatique-haguenau.fr\/index.php\/2026\/04\/24\/phishing_reconnaitre_les_arnaques\/\">Phishing : Reconna\u00eetre les Arnaques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/solutions-informatique-haguenau.fr\/index.php\/2026\/04\/24\/phishing_reconnaitre_les_arnaques\/embed\/#?secret=2aNGr2cgHu\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Phishing : Reconna\u00eetre les Arnaques\u00a0\u00bb &#8212; Solutions-informatique-haguenau\" data-secret=\"2aNGr2cgHu\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/solutions-informatique-haguenau.fr\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Un email en apparence banal, un lien cliqu\u00e9 sans r\u00e9fl\u00e9chir, et c'est toute l'infrastructure informatique d'une entreprise qui peut \u00eatre compromise. Le phishing (ou hame\u00e7onnage) est aujourd'hui l'origine de plus de 80 % des cyberattaques r\u00e9ussies contre les entreprises."}