{"id":606,"date":"2013-12-31T11:48:46","date_gmt":"2013-12-31T11:48:46","guid":{"rendered":"https:\/\/www.dsconsultant.net\/blog\/?p=606"},"modified":"2014-01-11T16:47:04","modified_gmt":"2014-01-11T16:47:04","slug":"logiciels-malveillants-et-fraudes-via-les-mobiles","status":"publish","type":"post","link":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles","title":{"rendered":"Logiciels malveillants et fraudes via les mobiles"},"content":{"rendered":"<p>L&rsquo;ann\u00e9e derni\u00e8re, le jour de No\u00ebl, plus de 17 millions de nouveaux appareils mobiles se sont connect\u00e9s. Les jolis cadeaux n&rsquo;\u00e9taient m\u00eame pas encore d\u00e9ball\u00e9s que les cyberescrocs avaient d\u00e9j\u00e0 commenc\u00e9 leurs attaques.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?ssl=1\"><img loading=\"lazy\" class=\"size-medium wp-image-611 aligncenter\" alt=\"santa-with-mobile2\" src=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?resize=300%2C143&#038;ssl=1\" width=\"300\" height=\"143\" srcset=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?resize=300%2C143&amp;ssl=1 300w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?resize=1024%2C489&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?w=1124&amp;ssl=1 1124w\" sizes=\"(max-width: 300px) 100vw, 300px\" data-recalc-dims=\"1\" \/><\/a><!--more-->Dans la premi\u00e8re moiti\u00e9 de cette ann\u00e9e 2013, les experts ont signal\u00e9 que 79 % de toutes les attaques de logiciels malveillants mobiles ciblaient les syst\u00e8mes Android. Lorsque nous avons questionn\u00e9 Ondrej Vl\u010dek, chef du service Technologie de avast!, sur la s\u00e9curit\u00e9 mobile en 2013 et sur ce \u00e0 quoi nous pouvons nous attendre en 2014, il a r\u00e9pondu\u00a0: \u00ab\u00a0<em>Les menaces mobiles continueront assur\u00e9ment \u00e0 augmenter. Nous identifions pr\u00e8s de 2.000 nouveaux \u00e9chantillons de malwares sur Android chaque jour, alors que nous en \u00e9tions \u00e0 50 il y a un an.\u00a0Il est tr\u00e8s probable que la tendance<\/em> <em>se poursuive, surtout si vous utilisez un appareil Android. Vous avez, dans ce cas, absolument besoin d&rsquo;installer un produit de<\/em> <em>s\u00e9curit\u00e9<\/em>.\u00a0\u00bb<\/p>\n<p><strong>La fraude en ligne ira en grandissant sur les mobiles<\/strong><\/p>\n<p>Ouvrant la voie \u00e0 des possibilit\u00e9s de paiement en ligne, comme ce qu&rsquo;ont d\u00e9velopp\u00e9 le Japon et Singapour, les t\u00e9l\u00e9phones mobiles se sont transform\u00e9s en porte-monnaie\u00a0 en 2013, et la vie priv\u00e9e et la s\u00e9curit\u00e9 des donn\u00e9es sont devenues des questions critiques au cours des derni\u00e8res ann\u00e9es. En effet, les nouvelles options de paiement via les mobiles introduisent de nouvelles menaces de piratage de donn\u00e9es et de fraude.<\/p>\n<p>Avast! a d\u00e9tect\u00e9 une moyenne de\u00a01 839 nouveaux \u00e9chantillons de malwares mobiles par jour\u00a0, et environ 60 \u00e0 70% d&rsquo;entre eux ont \u00e9t\u00e9 con\u00e7us pour \u00eatre envoy\u00e9s aux utilisateurs mobiles de SMS premium.<\/p>\n<p>S&rsquo;adressant \u00e0 SC Magazine sur les logiciels malveillants mobiles, Vl\u010dek disait : \u00ab<em>Sur les Android, les KPI sont en train d&rsquo;exploser car leur<\/em> <em>ouverture et leur conception en font un choix logique pour l&rsquo;attaquant. De plus, les Android ont atteint une masse critique en termes de<\/em> <em>p\u00e9n\u00e9tration et de parts de march\u00e9<\/em>. \u00bb<br \/>\nIl ajoute que les capacit\u00e9s du smartphone pour envoyer des SMS surtax\u00e9s et des mails offrent de nouvelles voies pour les auteurs de malwares, et que cela ne fera qu&#8217;empirer.<\/p>\n<p>Cette ann\u00e9e, avast! a \u00e9galement constat\u00e9 des attaques plus cibl\u00e9es dont l&rsquo;objectif est de voler des donn\u00e9es sur les transactions financi\u00e8res des utilisateurs et, in fine, leur argent.\u00a0Cela inclut notamment la manipulation d&rsquo;interfaces bancaires sur Internet permettant d&rsquo;acc\u00e9der aux donn\u00e9es personnelles des clients.<\/p>\n<p>Il serait donc judicieux de suivre les conseils de Ondrej et de se munir d&rsquo;un produit de s\u00e9curit\u00e9 mobile pour votre smartphone ou tablette Android tel que avast!\u00a0Libre Mobile Security.<\/p>\n<p>Source &#8211; Article complet en anglais :<br \/>\n<a href=\"https:\/\/blog.avast.com\/2013\/12\/27\/what-bugged-avast-users-this-year-mobile-malware-and-fraud\/\" target=\"_blank\">https:\/\/blog.avast.com\/2013\/12\/27\/what-bugged-avast-users-this-year-mobile-malware-and-fraud\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;ann\u00e9e derni\u00e8re, le jour de No\u00ebl, plus de 17 millions de nouveaux appareils mobiles se sont connect\u00e9s. Les jolis cadeaux n&rsquo;\u00e9taient m\u00eame pas encore d\u00e9ball\u00e9s que les cyberescrocs avaient d\u00e9j\u00e0 commenc\u00e9 leurs attaques.<\/p>\n","protected":false},"author":604,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[40,27],"tags":[26,44],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"og:description\" content=\"L&rsquo;ann\u00e9e derni\u00e8re, le jour de No\u00ebl, plus de 17 millions de nouveaux appareils mobiles se sont connect\u00e9s. Les jolis cadeaux n&rsquo;\u00e9taient m\u00eame pas encore d\u00e9ball\u00e9s que les cyberescrocs avaient d\u00e9j\u00e0 commenc\u00e9 leurs attaques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles\" \/>\n<meta property=\"og:site_name\" content=\"Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dsconsultant.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-12-31T11:48:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-01-11T16:47:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2-300x143.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"La r\u00e9daction\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\",\"url\":\"https:\/\/dsconsultant.net\/blog\/\",\"name\":\"Mes Notes, Astuces &amp; Conseils informatiques\",\"description\":\"Dominique Schos Consultant Conseil informatique Maroc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?fit=1124%2C537&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?fit=1124%2C537&ssl=1\",\"width\":1124,\"height\":537},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#webpage\",\"url\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles\",\"name\":\"Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques\",\"isPartOf\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#primaryimage\"},\"datePublished\":\"2013-12-31T11:48:46+00:00\",\"dateModified\":\"2014-01-11T16:47:04+00:00\",\"author\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/5a07e480763c9b054bb27678609c4315\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/dsconsultant.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logiciels malveillants et fraudes via les mobiles\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/5a07e480763c9b054bb27678609c4315\",\"name\":\"La r\u00e9daction\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11b4228717d45831ddc81bcd65089770?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11b4228717d45831ddc81bcd65089770?s=96&d=mm&r=g\",\"caption\":\"La r\u00e9daction\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles","og_locale":"fr_FR","og_type":"article","og_title":"Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques","og_description":"L&rsquo;ann\u00e9e derni\u00e8re, le jour de No\u00ebl, plus de 17 millions de nouveaux appareils mobiles se sont connect\u00e9s. Les jolis cadeaux n&rsquo;\u00e9taient m\u00eame pas encore d\u00e9ball\u00e9s que les cyberescrocs avaient d\u00e9j\u00e0 commenc\u00e9 leurs attaques.","og_url":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles","og_site_name":"Mes Notes, Astuces &amp; Conseils informatiques","article_publisher":"https:\/\/www.facebook.com\/dsconsultant.net\/","article_published_time":"2013-12-31T11:48:46+00:00","article_modified_time":"2014-01-11T16:47:04+00:00","og_image":[{"url":"https:\/\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2-300x143.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"La r\u00e9daction","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/dsconsultant.net\/blog\/#website","url":"https:\/\/dsconsultant.net\/blog\/","name":"Mes Notes, Astuces &amp; Conseils informatiques","description":"Dominique Schos Consultant Conseil informatique Maroc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#primaryimage","url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?fit=1124%2C537&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/santa-with-mobile2.jpg?fit=1124%2C537&ssl=1","width":1124,"height":537},{"@type":"WebPage","@id":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#webpage","url":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles","name":"Logiciels malveillants et fraudes via les mobiles - Mes Notes, Astuces &amp; Conseils informatiques","isPartOf":{"@id":"https:\/\/dsconsultant.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#primaryimage"},"datePublished":"2013-12-31T11:48:46+00:00","dateModified":"2014-01-11T16:47:04+00:00","author":{"@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/5a07e480763c9b054bb27678609c4315"},"breadcrumb":{"@id":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dsconsultant.net\/blog\/news\/logiciels-malveillants-et-fraudes-via-les-mobiles#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/dsconsultant.net\/blog"},{"@type":"ListItem","position":2,"name":"Logiciels malveillants et fraudes via les mobiles"}]},{"@type":"Person","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/5a07e480763c9b054bb27678609c4315","name":"La r\u00e9daction","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11b4228717d45831ddc81bcd65089770?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11b4228717d45831ddc81bcd65089770?s=96&d=mm&r=g","caption":"La r\u00e9daction"}}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/606"}],"collection":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/users\/604"}],"replies":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/comments?post=606"}],"version-history":[{"count":0,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/606\/revisions"}],"wp:attachment":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media?parent=606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/categories?post=606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/tags?post=606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}