﻿{"id":21878,"date":"2018-03-29T00:30:38","date_gmt":"2018-03-28T22:30:38","guid":{"rendered":"https:\/\/valoxy.org\/blog\/?p=21878"},"modified":"2018-03-29T00:30:38","modified_gmt":"2018-03-28T22:30:38","slug":"phishing-comment-detecter-un-message-malveillant","status":"publish","type":"post","link":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/","title":{"rendered":"Phishing: comment d\u00e9tecter un message malveillant ?"},"content":{"rendered":"<p>Des personnes malintentionn\u00e9es (cyber-escrocs) tentent de mettre la main sur vos donn\u00e9es personnelles. Elles utilisent <strong>des techniques de <\/strong><strong>hame<\/strong><strong>\u00e7<\/strong><strong>onnage<\/strong> <strong>(<\/strong><strong>phishing <\/strong><strong>en anglais)<\/strong>. Ces personnes se font passer pour quelqu\u2019un en qui vous avez \u00e0 priori confiance. Elles vous envoient des messages frauduleux destin\u00e9s \u00e0 vous inciter \u00e0 partager des informations personnelles en ligne. Ces techniques d\u2019attaque \u00e9voluent constamment.<\/p>\n<p>Valoxy, cabinet d&rsquo;expertise comptable dans les Hauts de France, vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.<\/p>\n<p>&nbsp;<\/p>\n<h2>Quel est le principe du phishing ?<\/h2>\n<p>Les attaques par hame\u00e7onnage se font g\u00e9n\u00e9ralement par un courriel, une publicit\u00e9 ou au travers de sites internet contrefaits, tr\u00e8s similaires \u00e0 ceux que vous utilisez habituellement (banque, administration, S\u00e9curit\u00e9 Sociale\u2026). Leur objectif est de vous pousser \u00e0 r\u00e9v\u00e9ler des informations personnelles. Il utilisent l\u2019usurpation d\u2019identit\u00e9 pour vous convaincre de leur r\u00e9pondre. Par exemple, vous recevez un courriel qui semble provenir de votre banque, ou de l\u2019Urssaf (avec son nom, son logo etc.) dans lequel il vous est demand\u00e9 de \u00ab\u00a0mettre \u00e0 jour\u00a0\u00bb certaines informations, ou de \u00ab\u00a0confirmer suite \u00e0 un incident technique\u00a0\u00bb vos donn\u00e9es, et notamment vos donn\u00e9es bancaires, en dirigeant votre r\u00e9ponse sur une fausse adresse courriel ou un site internet contrefait.<\/p>\n<p>&nbsp;<\/p>\n<h2>Comment rep\u00e9rer une arnaque et s\u2019en prot\u00e9ger\u00a0?<\/h2>\n<ul>\n<li>G\u00e9n\u00e9ralement, les messages malveillants ne sont <strong>pas<\/strong> <strong>personnalis\u00e9s <\/strong>et ils sont envoy\u00e9s \u00e0 un grand nombre de destinataires cibles.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Attention aux exp\u00e9diteurs :<\/strong> les pirates n\u2019h\u00e9sitent pas \u00e0 se faire passer pour une banque, une administration, voire une entreprise ou une personne de votre connaissance pour gagner votre confiance.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Soyez attentif au\u00a0langage et \u00e0 l\u2019expression du courriel\u00a0<\/strong>: les messages en provenance de grandes entreprises et des administrations comportent rarement des fautes d\u2019expression, d\u2019orthographe ou de grammaire. Donc, si le message comporte des fautes de frappe, des fautes d\u2019orthographe ou des expressions mal employ\u00e9es, c\u2019est qu\u2019il s\u2019agit tr\u00e8s vraisemblablement d\u2019une arnaque.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>V\u00e9rifiez les liens dans le courriel\u00a0: v<\/strong>\u00e9rifiez que l\u2019adresse du site vers lequel renvoie le message soit coh\u00e9rente, et pointe effectivement vers le site r\u00e9el et l\u00e9gitime de votre interlocuteur. Ainsi, v\u00e9rifiez bien l\u2019exactitude des adresses des sites, comme gouvv.fr ou impots.gouvfr.biz au lieu de <a href=\"http:\/\/impots.gouv.fr\">impots.gouv.fr<\/a>, infocaf.org au lieu de www.caf.fr, etc.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>D\u2019une fa\u00e7on g\u00e9n\u00e9rale, <strong>ne r\u00e9pondez jamais aux courriels non sollicit\u00e9s<\/strong>, n\u2019acc\u00e9dez pas aux sites qu\u2019ils vous proposent, ou que les r\u00e9seaux sociaux (type Facebook) vous envoient.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>M\u00e9fiez-vous des demandes \u00e9tranges <\/strong>: un organisme ou une entreprise cr\u00e9dible ne vous demandera jamais votre mot de passe, votre num\u00e9ro de carte de cr\u00e9dit, ou la r\u00e9ponse \u00e0 une question de s\u00e9curit\u00e9 par courriel. D\u2019une mani\u00e8re g\u00e9n\u00e9rale, ne r\u00e9pondez jamais \u00e0 un message qui vous demande des renseignements <u>personnels<\/u>.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>\u00a0<\/strong><strong>\u00a0<\/strong><\/p>\n<h2>Comment r\u00e9agir ?<\/h2>\n<p>Vous recevez un courriel d\u2019un site vous demandant des informations personnelles ? Il y a de fortes chances que celui-ci soit une arnaque :<\/p>\n<ul>\n<li>Ne cliquez sur aucun lien et ne fournissez aucune information personnelle<\/li>\n<li>N\u2019ouvrez <strong>JAMAIS<\/strong> les pi\u00e8ces jointes<\/li>\n<li>Supprimez le message puis videz la corbeille<\/li>\n<li>Signalez l\u2019e-mail sur la plateforme gouvernementale <a href=\"http:\/\/internet-signalement.gouv.fr\">internet-signalement.gouv.fr<\/a><\/li>\n<li>S\u2019il s\u2019agit de votre compte de messagerie professionnel. Transf\u00e9rez-le au service informatique et au responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d&rsquo;information de votre entreprise pour v\u00e9rification. Attendez leur r\u00e9ponse avant de supprimer le courrier \u00e9lectronique.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Comment s\u2019en pr\u00e9munir ?<\/h2>\n<ul>\n<li><strong>Utilisez un logiciel de filtre anti spam<\/strong>, qui permet de r\u00e9duire le nombre de ces courriels.<\/li>\n<li><strong>Utilisez le filtre contre le hame\u00e7onnage de votre navigateur internet.<\/strong>\u00a0Ces fonctions aident \u00e0 maintenir la vigilance de l\u2019utilisateur, gr\u00e2ce \u00e0 des rappels r\u00e9guliers.<\/li>\n<li>Installez un anti-virus sur votre ordinateur et mettez-le \u00e0 jour.<\/li>\n<li>D\u00e9sactivez le volet de pr\u00e9-visualisation des messages.<\/li>\n<li>Lisez vos messages en mode texte brut.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><span class=\"s1\">Vous voulez en savoir plus sur les dangers en ligne, les arnaques sur internet et les virus informatiques ? Retrouvez nos articles sur le blog de Valoxy : <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/le-ransomware\/\"><span class=\"s3\">Le Ransomware<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/escroqueries-en-tout-genre\/\"><span class=\"s3\">Escroqueries en tout genre<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/spams-du-bon-usage-des-courriels\/\"><span class=\"s3\">Spams, du bon usage des courriels<\/span><\/a><\/span><\/li>\n<li class=\"li2\"><span class=\"s2\"><a href=\"https:\/\/valoxy.org\/blog\/keylogger-au-bureau\/\"><span class=\"s3\">\u00ab Keylogger \u00bb au bureau : employeurs attention !<\/span><\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Des personnes malintentionn\u00e9es (cyber-escrocs) tentent de mettre la main sur vos donn\u00e9es personnelles. Elles utilisent des techniques de hame\u00e7onnage (phishing en anglais). Ces personnes se font passer pour quelqu\u2019un en qui vous avez \u00e0 priori confiance. Elles vous envoient des&#8230;<\/p>\n","protected":false},"author":1,"featured_media":21879,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-21878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bons-plans-valoxy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable<\/title>\n<meta name=\"description\" content=\"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable\" \/>\n<meta property=\"og:description\" content=\"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Valoxy - Expertise comptable\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Valoxy\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-28T22:30:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Expert-comptable Valoxy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Expert-comptable Valoxy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\"},\"author\":{\"name\":\"Expert-comptable Valoxy\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a\"},\"headline\":\"Phishing: comment d\u00e9tecter un message malveillant ?\",\"datePublished\":\"2018-03-28T22:30:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\"},\"wordCount\":736,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg\",\"articleSection\":[\"Bons plans Valoxy\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\",\"url\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\",\"name\":\"Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable\",\"isPartOf\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg\",\"datePublished\":\"2018-03-28T22:30:38+00:00\",\"description\":\"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.\",\"breadcrumb\":{\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage\",\"url\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg\",\"contentUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg\",\"width\":700,\"height\":466,\"caption\":\"Phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/valoxy.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing: comment d\u00e9tecter un message malveillant ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/valoxy.org\/blog\/#website\",\"url\":\"https:\/\/valoxy.org\/blog\/\",\"name\":\"Blog Valoxy\",\"description\":\"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise\",\"publisher\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\"},\"alternateName\":\"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/valoxy.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/valoxy.org\/blog\/#organization\",\"name\":\"Blog Valoxy\",\"url\":\"https:\/\/valoxy.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png\",\"contentUrl\":\"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png\",\"width\":266,\"height\":100,\"caption\":\"Blog Valoxy\"},\"image\":{\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Valoxy\",\"https:\/\/www.linkedin.com\/company\/valoxy\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a\",\"name\":\"Expert-comptable Valoxy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/valoxy.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g\",\"caption\":\"Expert-comptable Valoxy\"},\"sameAs\":[\"https:\/\/valoxy.org\/blog\"],\"url\":\"https:\/\/valoxy.org\/blog\/author\/ceo-valoxy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable","description":"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/","og_locale":"fr_FR","og_type":"article","og_title":"Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable","og_description":"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.","og_url":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/","og_site_name":"Blog Valoxy - Expertise comptable","article_publisher":"https:\/\/www.facebook.com\/Valoxy","article_published_time":"2018-03-28T22:30:38+00:00","og_image":[{"width":700,"height":466,"url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg","type":"image\/jpeg"}],"author":"Expert-comptable Valoxy","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Expert-comptable Valoxy","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#article","isPartOf":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/"},"author":{"name":"Expert-comptable Valoxy","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a"},"headline":"Phishing: comment d\u00e9tecter un message malveillant ?","datePublished":"2018-03-28T22:30:38+00:00","mainEntityOfPage":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/"},"wordCount":736,"commentCount":0,"publisher":{"@id":"https:\/\/valoxy.org\/blog\/#organization"},"image":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage"},"thumbnailUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg","articleSection":["Bons plans Valoxy"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/","url":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/","name":"Phishing: comment d\u00e9tecter un message malveillant ? | Blog Valoxy - Expertise comptable","isPartOf":{"@id":"https:\/\/valoxy.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage"},"image":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage"},"thumbnailUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg","datePublished":"2018-03-28T22:30:38+00:00","description":"Phishing: comment d\u00e9tecter un message malveillant? Valoxy vous en dit plus et vous aide \u00e0 vous pr\u00e9munir contre ces arnaques.","breadcrumb":{"@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#primaryimage","url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg","contentUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2018\/03\/phishing-e1620203986620-1.jpg","width":700,"height":466,"caption":"Phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/valoxy.org\/blog\/phishing-comment-detecter-un-message-malveillant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/valoxy.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing: comment d\u00e9tecter un message malveillant ?"}]},{"@type":"WebSite","@id":"https:\/\/valoxy.org\/blog\/#website","url":"https:\/\/valoxy.org\/blog\/","name":"Blog Valoxy","description":"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise","publisher":{"@id":"https:\/\/valoxy.org\/blog\/#organization"},"alternateName":"Le Blog Valoxy, ce sont plus de 1500 articles sur toute l&#039;actualit\u00e9 comptable, juridique, fiscale, et la gestion d&#039;entreprise","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/valoxy.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/valoxy.org\/blog\/#organization","name":"Blog Valoxy","url":"https:\/\/valoxy.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png","contentUrl":"https:\/\/valoxy.org\/blog\/wp-content\/uploads\/2024\/05\/cropped-blog-valoxy-logo-300x118-2.png","width":266,"height":100,"caption":"Blog Valoxy"},"image":{"@id":"https:\/\/valoxy.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Valoxy","https:\/\/www.linkedin.com\/company\/valoxy"]},{"@type":"Person","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/d285f250195f45509ceac046366fcc4a","name":"Expert-comptable Valoxy","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/valoxy.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e8d0ed8d4c117e5d77ddb78bbcab5f6b5841424c6b20eeaafcfd8741ef2aa2c?s=96&d=mm&r=g","caption":"Expert-comptable Valoxy"},"sameAs":["https:\/\/valoxy.org\/blog"],"url":"https:\/\/valoxy.org\/blog\/author\/ceo-valoxy\/"}]}},"_links":{"self":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts\/21878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/comments?post=21878"}],"version-history":[{"count":0,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/posts\/21878\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/media\/21879"}],"wp:attachment":[{"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/media?parent=21878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/categories?post=21878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/valoxy.org\/blog\/wp-json\/wp\/v2\/tags?post=21878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}