{"id":14168,"date":"2015-11-26T12:07:10","date_gmt":"2015-11-26T11:07:10","guid":{"rendered":"https:\/\/dev.sicherheitsforum.ch\/?p=848"},"modified":"2023-03-14T08:57:29","modified_gmt":"2023-03-14T07:57:29","slug":"sicherheitsbericht-von-trend-micros","status":null,"type":"post","link":"https:\/\/news.save.ch\/fr\/sicherheitsbericht-von-trend-micros\/","title":{"rendered":"Rapport de s\u00e9curit\u00e9 de Trend Micros"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-849 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security.jpg\" width=\"667\" height=\"1000\" \/><\/p>\n<p>Qu'il s'agisse de chantage \u00e0 l'aide de donn\u00e9es confidentielles vol\u00e9es ou de l'exploitation de failles de s\u00e9curit\u00e9 dans les appareils en r\u00e9seau, il s'agit l\u00e0, selon le <a href=\"https:\/\/www.trendmicro.de\/sicherheitsinformationen\/forschung\/trendlabs-q3-2015-security-roundup\/index.html\" target=\"_blank\" data-cke-saved-href=\"https:\/\/www.trendmicro.de\/sicherheitsinformationen\/forschung\/trendlabs-q3-2015-security-roundup\/index.html\" rel=\"noopener\">Rapport de s\u00e9curit\u00e9 <\/a>de Trend Micros, les signes avant-coureurs des \u00e9v\u00e9nements de 2016 :<\/p>\n<p><strong>Les donn\u00e9es issues des attaques de piratage servent de base au chantage<\/strong><\/p>\n<p>Les attaques r\u00e9ussies contre l'\"\u00e9quipe de piratage\" et le portail am\u00e9ricain de rencontres extraconjugales \"Ashley Madison\" ont eu des r\u00e9percussions importantes sur l'ensemble de l'industrie de la s\u00e9curit\u00e9 et de l'informatique. D'une part, elles ont entra\u00een\u00e9 toute une s\u00e9rie d'autres attaques, d'autre part, il faut s'attendre \u00e0 ce que les futures attaques se d\u00e9roulent selon un mod\u00e8le comparable. La publication sur Internet des informations confidentielles vol\u00e9es a caus\u00e9 des dommages bien plus importants que l'interruption de l'activit\u00e9 et a port\u00e9 atteinte \u00e0 la r\u00e9putation des personnes concern\u00e9es - les cybercriminels qui ont extorqu\u00e9 des clients d'\"Ashley Madison\" \u00e0 l'aide des informations compromises ont ainsi touch\u00e9 aussi bien l'exploitant du site, \"Avid Life Media\", qu'un grand nombre de ses plus de 30 millions de clients.<\/p>\n<p>L'expert en s\u00e9curit\u00e9 Udo Schneider de Trend Micro explique : \"Le d\u00e9veloppement des br\u00e8ches de donn\u00e9es a un impact direct sur la vie r\u00e9elle, sur les entreprises comme sur les personnes. Les failles de s\u00e9curit\u00e9 et les violations de la protection des donn\u00e9es r\u00e9v\u00e9l\u00e9es au cours du dernier trimestre ne sont qu'un d\u00e9but, il est certain que davantage d'informations confidentielles, voire destructrices, seront rendues publiques, pour \u00eatre ensuite \u00e9ventuellement vendues au plus offrant sur le 'Deep Web'\".<\/p>\n<p><strong>Les attaques contre le secteur de la sant\u00e9 se multiplient<\/strong><\/p>\n<p>C'est une \u00e9volution malsaine : les donn\u00e9es personnelles et de sant\u00e9 ont \u00e9t\u00e9 les deuxi\u00e8mes types de donn\u00e9es les plus vol\u00e9es au cours du trimestre \u00e9coul\u00e9. Parmi les incidents connus dans le secteur de la sant\u00e9, l'attaque du syst\u00e8me de sant\u00e9 de l'UCLA a compromis les donn\u00e9es personnelles d'environ 4,5 millions de patients. De telles attaques montrent clairement pourquoi le secteur de la sant\u00e9 restera une cible convoit\u00e9e par les cybercriminels.<\/p>\n<p><strong>Nouvelles failles de s\u00e9curit\u00e9 dans les plates-formes mobiles<\/strong><\/p>\n<p>Les terminaux mobiles font l'objet d'une attention constante. En r\u00e9ponse \u00e0 la d\u00e9couverte de plusieurs failles de s\u00e9curit\u00e9 Android, qui a mis en \u00e9vidence la n\u00e9cessit\u00e9 d'une approche int\u00e9gr\u00e9e avec plusieurs strat\u00e9gies de s\u00e9curit\u00e9, Google a annonc\u00e9 - apr\u00e8s de longues h\u00e9sitations - des mises \u00e0 jour de s\u00e9curit\u00e9 r\u00e9guli\u00e8res pour sa plateforme.<\/p>\n<p>Pendant ce temps, des versions modifi\u00e9es des outils de cr\u00e9ation d'applications ont d\u00e9mystifi\u00e9 l'id\u00e9e fausse selon laquelle l'approche \"walled garden\" du syst\u00e8me d'exploitation iOS permettrait de prot\u00e9ger totalement la plateforme contre les attaques.<\/p>\n<p><strong>De plus en plus d'attaques sur les syst\u00e8mes PoS des PME<\/strong><\/p>\n<p>Les attaques contre les syst\u00e8mes PoS ont touch\u00e9 un nombre croissant de PME au cours du dernier trimestre. L'une des raisons pourrait \u00eatre le fait que ces entreprises utilisent g\u00e9n\u00e9ralement de vastes bases de donn\u00e9es clients, sans pour autant disposer d'une s\u00e9curit\u00e9 ad\u00e9quate. Les attaques observ\u00e9es utilisaient des logiciels malveillants pour les points de vente, diffus\u00e9s par exemple par des techniques \"anciennes\" comme le spam, mais aussi par des outils comme les logiciels malveillants pour les macros, les kits d'exploitation et les botnets.<\/p>\n<p><strong>Les politiciens, cibles des campagnes d'espionnage en cours<\/strong><\/p>\n<p>Une analyse de donn\u00e9es r\u00e9centes a montr\u00e9 que l'op\u00e9ration \"Pawn Storm\" a \u00e9largi ses objectifs et ne se limite apparemment pas \u00e0 l'espionnage \u00e0 l'\u00e9tranger : Si la campagne de cyberespionnage \u00e9tait jusqu'\u00e0 pr\u00e9sent connue pour attaquer des pays membres de l'OTAN comme l'Allemagne ou des installations de d\u00e9fense aux Etats-Unis, cette image doit \u00eatre corrig\u00e9e : Au contraire, ses activit\u00e9s douteuses sont \u00e9galement dirig\u00e9es vers l'int\u00e9rieur, contre des hommes politiques, des artistes, des journalistes et des d\u00e9veloppeurs de logiciels de cryptage en Russie.<\/p>\n<p><strong>Le kit \"Angler-Exploit\" continue de se r\u00e9pandre \u00e0 grande \u00e9chelle<\/strong><\/p>\n<p>Les criminels \u00e0 l'origine du kit d'exploitation Angler ont non seulement continu\u00e9 \u00e0 mettre \u00e0 jour leur arsenal au cours du dernier trimestre, ce qui leur a permis de diffuser de nouveaux malwares, mais ils l'ont \u00e9galement fait \u00e0 grande \u00e9chelle : il reste le kit d'exploitation le plus actif et affiche un taux de croissance de 34% depuis le deuxi\u00e8me trimestre.<\/p>\n<p><strong>Internet des objets<\/strong><\/p>\n<p>Les risques li\u00e9s aux failles de s\u00e9curit\u00e9 des appareils connect\u00e9s \u00e0 Internet ont des r\u00e9percussions non seulement sur la vie priv\u00e9e des personnes, mais aussi sur leur int\u00e9grit\u00e9 physique. Plusieurs r\u00e9sultats de recherche, notamment dans diff\u00e9rents domaines, soul\u00e8vent des questions sur la s\u00e9curit\u00e9 des appareils connect\u00e9s \u00e0 Internet : Le piratage des voitures, par exemple, qui n'\u00e9tait qu'une id\u00e9e lointaine il y a quelques ann\u00e9es, est en train de devenir une r\u00e9alit\u00e9. Les fabricants de ces appareils doivent donc collaborer avec des experts en s\u00e9curit\u00e9 s'ils veulent garantir l'int\u00e9grit\u00e9 de leurs clients.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Ob Erpressung mithilfe gestohlener vertraulicher Daten oder das Ausnutzen von Sicherheitsl\u00fccken in vernetzten Ger\u00e4ten \u2013 dies sind gem\u00e4ss dem Sicherheitsbericht von Trend Micros die Vorboten der Ereignisse im Jahr 2016: Daten aus Hacking-Angriffen als Basis f\u00fcr Erpressung Grosse Auswirkungen auf die gesamte Sicherheits- und die Computerindustrie hatten die erfolgreichen Angriffe gegen das \u201eHacking-Team\u201c und das [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[96,63],"class_list":["post-14168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-cyber-crime","tag-it-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"2","_yoast_wpseo_focuskw_text_input":"Sicherheitsbericht von Trend Micros","_yoast_wpseo_opengraph-image":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security.jpg","_yoast_wpseo_opengraph-description":"Trend Micros hat seinen Sicherheitsbericht f\u00fcr das dritte Quartal ver\u00f6ffentlicht und schreibt dazu: \u201eWir sind an einem Punkt angelangt, an dem die Gefahren aus der IT-Welt direkte Auswirkungen auf fast alle Bereiche des t\u00e4glichen Lebens haben.\u201c","_yoast_wpseo_opengraph-title":"Sicherheitsbericht von Trend Micros","enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicherheitsbericht von Trend Micros - Save<\/title>\n<meta name=\"description\" content=\"Sicherheitsbericht von Trend Micros: Wir sind an einem Punkt angelangt, an dem die Gefahren der IT-Welt direkte Auswirkungen auf fast alle Bereiche haben\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/fr\/sicherheitsbericht-von-trend-micros\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicherheitsbericht von Trend Micros\" \/>\n<meta property=\"og:description\" content=\"Trend Micros hat seinen Sicherheitsbericht f\u00fcr das dritte Quartal ver\u00f6ffentlicht und schreibt dazu: \u201eWir sind an einem Punkt angelangt, an dem die Gefahren aus der IT-Welt direkte Auswirkungen auf fast alle Bereiche des t\u00e4glichen Lebens haben.\u201c\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/fr\/sicherheitsbericht-von-trend-micros\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-26T11:07:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:57:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\"},\"headline\":\"Sicherheitsbericht von Trend Micros\",\"datePublished\":\"2015-11-26T11:07:10+00:00\",\"dateModified\":\"2023-03-14T07:57:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/\"},\"wordCount\":646,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg\",\"keywords\":[\"Cyber-Crime\",\"IT-SECURITY\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/\",\"name\":\"Sicherheitsbericht von Trend Micros - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg\",\"datePublished\":\"2015-11-26T11:07:10+00:00\",\"dateModified\":\"2023-03-14T07:57:29+00:00\",\"description\":\"Sicherheitsbericht von Trend Micros: Wir sind an einem Punkt angelangt, an dem die Gefahren der IT-Welt direkte Auswirkungen auf fast alle Bereiche haben\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg\",\"width\":933,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/sicherheitsbericht-von-trend-micros\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicherheitsbericht von Trend Micros\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d49e199490bad7c70d64b9ab51142f2b\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/develop.organisator.galledia.ch\"],\"url\":\"https:\\\/\\\/news.save.ch\\\/fr\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rapport de s\u00e9curit\u00e9 de Trend Micro - Save","description":"Rapport de s\u00e9curit\u00e9 de Trend Micro : nous sommes arriv\u00e9s \u00e0 un point o\u00f9 les menaces du monde informatique ont un impact direct sur presque tous les domaines","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/fr\/sicherheitsbericht-von-trend-micros\/","og_locale":"fr_FR","og_type":"article","og_title":"Sicherheitsbericht von Trend Micros","og_description":"Trend Micros hat seinen Sicherheitsbericht f\u00fcr das dritte Quartal ver\u00f6ffentlicht und schreibt dazu: \u201eWir sind an einem Punkt angelangt, an dem die Gefahren aus der IT-Welt direkte Auswirkungen auf fast alle Bereiche des t\u00e4glichen Lebens haben.\u201c","og_url":"https:\/\/news.save.ch\/fr\/sicherheitsbericht-von-trend-micros\/","og_site_name":"Save","article_published_time":"2015-11-26T11:07:10+00:00","article_modified_time":"2023-03-14T07:57:29+00:00","og_image":[{"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/"},"author":{"name":"admin","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b"},"headline":"Sicherheitsbericht von Trend Micros","datePublished":"2015-11-26T11:07:10+00:00","dateModified":"2023-03-14T07:57:29+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/"},"wordCount":646,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg","keywords":["Cyber-Crime","IT-SECURITY"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/","url":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/","name":"Rapport de s\u00e9curit\u00e9 de Trend Micro - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg","datePublished":"2015-11-26T11:07:10+00:00","dateModified":"2023-03-14T07:57:29+00:00","description":"Rapport de s\u00e9curit\u00e9 de Trend Micro : nous sommes arriv\u00e9s \u00e0 un point o\u00f9 les menaces du monde informatique ont un impact direct sur presque tous les domaines","breadcrumb":{"@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2016\/12\/Sicherheitsbericht-von-Trend-Micros-it-security-scaled.jpg","width":933,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/sicherheitsbericht-von-trend-micros\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Sicherheitsbericht von Trend Micros"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Save","description":"Revue suisse sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sur la s\u00e9curit\u00e9","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d49e199490bad7c70d64b9ab51142f2b","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae2f4d718e6c49043e314ce431e7e645d646302a24a5ef5a8bc8e3f5a032e319?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/develop.organisator.galledia.ch"],"url":"https:\/\/news.save.ch\/fr\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/14168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/comments?post=14168"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/14168\/revisions"}],"predecessor-version":[{"id":17699,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/posts\/14168\/revisions\/17699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media\/13614"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/media?parent=14168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/categories?post=14168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/fr\/wp-json\/wp\/v2\/tags?post=14168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}