{"version":"1.0","provider_name":"Mes Notes, Astuces &amp; Conseils informatiques","provider_url":"https:\/\/dsconsultant.net\/blog","author_name":"Dominique Schos","author_url":"https:\/\/dsconsultant.net\/blog\/author\/admin","title":"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\"><a href=\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\">Comptes Google touch\u00e9s par un malware<\/a><\/blockquote>\n<script type='text\/javascript'>\n<!--\/\/--><![CDATA[\/\/><!--\n\t\t\/*! This file is auto-generated *\/\n\t\t!function(d,l){\"use strict\";var e=!1,n=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var r,i,a,s=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),c=0;c<n.length;c++)n[c].style.display=\"none\";for(c=0;c<s.length;c++)if(r=s[c],e.source===r.contentWindow){if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(a=parseInt(t.value,10)))a=1e3;else if(~~a<200)a=200;r.height=a}if(\"link\"===t.message)if(i=l.createElement(\"a\"),a=l.createElement(\"a\"),i.href=r.getAttribute(\"src\"),a.href=t.value,o.test(a.protocol))if(a.host===i.host)if(l.activeElement===r)d.top.location.href=t.value}}},e)d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),d.addEventListener(\"load\",t,!1);function t(){if(!n){n=!0;for(var e,t,r=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),i=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),a=l.querySelectorAll(\"iframe.wp-embedded-content\"),s=0;s<a.length;s++){if(!(e=a[s]).getAttribute(\"data-secret\"))t=Math.random().toString(36).substr(2,10),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t);if(r||i)(t=e.cloneNode(!0)).removeAttribute(\"security\"),e.parentNode.replaceChild(t,e)}}}}(window,document);\n\/\/--><!]]>\n<\/script><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\/embed\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Comptes Google touch\u00e9s par un malware\u00a0\u00bb &#8212; Mes Notes, Astuces &amp; Conseils informatiques\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe>","thumbnail_url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1","thumbnail_width":960,"thumbnail_height":678,"description":"Check Point, soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la cybers\u00e9curit\u00e9 r\u00e9v\u00e8le\u00a0une nouvelle menace appel\u00e9e Gooligan. Cette menace a d\u00e9j\u00e0 infect\u00e9 plus d\u2019un million de smartphones Android et continue de progresser tr\u00e8s vite avec plus de\u00a013\u00a0000 appareils touch\u00e9s \u00a0par jour. Les versions les plus \u00a0sensibles \u00e0 cette attaque seraient celles tournant sous Android Jelly Bean, KitKat et Lollipop, soit\u00a0\u00a0pr\u00e8s [&hellip;]"}