{"id":1024,"date":"2016-12-06T18:30:33","date_gmt":"2016-12-06T18:30:33","guid":{"rendered":"https:\/\/www.dsconsultant.net\/blog\/?p=1024"},"modified":"2016-12-06T18:46:11","modified_gmt":"2016-12-06T18:46:11","slug":"comptes-google-touches-par-un-malware","status":"publish","type":"post","link":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware","title":{"rendered":"Comptes Google touch\u00e9s par un malware"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?ssl=1\"><img loading=\"lazy\" class=\"alignleft wp-image-1025\" src=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?resize=366%2C259&#038;ssl=1\" alt=\"binary-1536593_960_720\" width=\"366\" height=\"259\" srcset=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?resize=300%2C212&amp;ssl=1 300w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?resize=768%2C542&amp;ssl=1 768w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?w=960&amp;ssl=1 960w\" sizes=\"(max-width: 366px) 100vw, 366px\" data-recalc-dims=\"1\" \/><\/a>Check Point, soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la cybers\u00e9curit\u00e9 r\u00e9v\u00e8le\u00a0une nouvelle menace appel\u00e9e Gooligan. Cette menace a d\u00e9j\u00e0 infect\u00e9 plus d\u2019un million de smartphones Android et continue de progresser tr\u00e8s vite avec plus de\u00a013\u00a0000 appareils touch\u00e9s \u00a0par jour.<\/p>\n<p>Les versions les plus \u00a0sensibles \u00e0 cette attaque seraient celles tournant sous Android Jelly Bean, KitKat et Lollipop, soit\u00a0\u00a0pr\u00e8s de 75 % des appareils\u00a0Android.<\/p>\n<p>\u00ab\u00a0Le malware s\u2019introduirait dans les appareils des utilisateurs via des applications v\u00e9rol\u00e9es ou bien par le biais de liens malveillants. Gooligan serait en mesure de voler des informations sur les appareils des comptes Google infect\u00e9s, comme des adresses e-mails ou bien des documents.\u00a0\u00bb<\/p>\n<p>&nbsp;<\/p>\n<p>Source\u00a0:\u00a0<em><a href=\"https:\/\/www.presse-citron.net\/plus-dun-million-de-comptes-google-touches-par-un-malware-le-votre-est-il-concerne\/\">Plus d\u2019un million de comptes Google touch\u00e9s par un malware<\/a><\/em><\/p>\n<blockquote><p>Android est victime d\u2019une nouvelle menace appel\u00e9e Gooligan.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>Plus d&rsquo;infos \u00e9galement sur la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 :\u00a0<a href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\">Check point<\/a>&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check Point, soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la cybers\u00e9curit\u00e9 r\u00e9v\u00e8le\u00a0une nouvelle menace appel\u00e9e Gooligan. Cette menace a d\u00e9j\u00e0 infect\u00e9 plus d\u2019un million de smartphones Android et continue de progresser tr\u00e8s vite avec plus de\u00a013\u00a0000 appareils touch\u00e9s \u00a0par jour. Les versions les plus \u00a0sensibles \u00e0 cette attaque seraient celles tournant sous Android Jelly Bean, KitKat et Lollipop, soit\u00a0\u00a0pr\u00e8s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1025,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"og:description\" content=\"Check Point, soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la cybers\u00e9curit\u00e9 r\u00e9v\u00e8le\u00a0une nouvelle menace appel\u00e9e Gooligan. Cette menace a d\u00e9j\u00e0 infect\u00e9 plus d\u2019un million de smartphones Android et continue de progresser tr\u00e8s vite avec plus de\u00a013\u00a0000 appareils touch\u00e9s \u00a0par jour. Les versions les plus \u00a0sensibles \u00e0 cette attaque seraient celles tournant sous Android Jelly Bean, KitKat et Lollipop, soit\u00a0\u00a0pr\u00e8s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\" \/>\n<meta property=\"og:site_name\" content=\"Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dsconsultant.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-06T18:30:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-12-06T18:46:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dominique Schos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\",\"url\":\"https:\/\/dsconsultant.net\/blog\/\",\"name\":\"Mes Notes, Astuces &amp; Conseils informatiques\",\"description\":\"Dominique Schos Consultant Conseil informatique Maroc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1\",\"width\":960,\"height\":678},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#webpage\",\"url\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\",\"name\":\"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques\",\"isPartOf\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#primaryimage\"},\"datePublished\":\"2016-12-06T18:30:33+00:00\",\"dateModified\":\"2016-12-06T18:46:11+00:00\",\"author\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/dsconsultant.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comptes Google touch\u00e9s par un malware\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\",\"name\":\"Dominique Schos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"caption\":\"Dominique Schos\"},\"description\":\"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \\\"Tchat\\\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \\\"flirter\\\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...\",\"sameAs\":[\"https:\/\/www.dsconsultant.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware","og_locale":"fr_FR","og_type":"article","og_title":"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques","og_description":"Check Point, soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la cybers\u00e9curit\u00e9 r\u00e9v\u00e8le\u00a0une nouvelle menace appel\u00e9e Gooligan. Cette menace a d\u00e9j\u00e0 infect\u00e9 plus d\u2019un million de smartphones Android et continue de progresser tr\u00e8s vite avec plus de\u00a013\u00a0000 appareils touch\u00e9s \u00a0par jour. Les versions les plus \u00a0sensibles \u00e0 cette attaque seraient celles tournant sous Android Jelly Bean, KitKat et Lollipop, soit\u00a0\u00a0pr\u00e8s [&hellip;]","og_url":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware","og_site_name":"Mes Notes, Astuces &amp; Conseils informatiques","article_publisher":"https:\/\/www.facebook.com\/dsconsultant.net\/","article_published_time":"2016-12-06T18:30:33+00:00","article_modified_time":"2016-12-06T18:46:11+00:00","og_image":[{"width":960,"height":678,"url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dominique Schos","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/dsconsultant.net\/blog\/#website","url":"https:\/\/dsconsultant.net\/blog\/","name":"Mes Notes, Astuces &amp; Conseils informatiques","description":"Dominique Schos Consultant Conseil informatique Maroc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#primaryimage","url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1","width":960,"height":678},{"@type":"WebPage","@id":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#webpage","url":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware","name":"Comptes Google touch\u00e9s par un malware - Mes Notes, Astuces &amp; Conseils informatiques","isPartOf":{"@id":"https:\/\/dsconsultant.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#primaryimage"},"datePublished":"2016-12-06T18:30:33+00:00","dateModified":"2016-12-06T18:46:11+00:00","author":{"@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92"},"breadcrumb":{"@id":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dsconsultant.net\/blog\/internet\/comptes-google-touches-par-un-malware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/dsconsultant.net\/blog"},{"@type":"ListItem","position":2,"name":"Comptes Google touch\u00e9s par un malware"}]},{"@type":"Person","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92","name":"Dominique Schos","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","caption":"Dominique Schos"},"description":"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \"Tchat\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \"flirter\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...","sameAs":["https:\/\/www.dsconsultant.net"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/binary-1536593_960_720.jpg?fit=960%2C678&ssl=1","_links":{"self":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/1024"}],"collection":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/comments?post=1024"}],"version-history":[{"count":0,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/1024\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media\/1025"}],"wp:attachment":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media?parent=1024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/categories?post=1024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/tags?post=1024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}