{"id":863,"date":"2015-04-24T19:12:19","date_gmt":"2015-04-24T19:12:19","guid":{"rendered":"https:\/\/www.dsconsultant.net\/blog\/?p=863"},"modified":"2015-04-25T19:12:30","modified_gmt":"2015-04-25T19:12:30","slug":"attention-mail-frauduleux","status":"publish","type":"post","link":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux","title":{"rendered":"Attention : mail frauduleux"},"content":{"rendered":"<p>Une des attaques les plus ridicules que j&rsquo;ai re\u00e7ues\u00a0ces derniers jours me demandant :<\/p>\n<p style=\"padding-left: 30px;\"><em>\u00ab\u00a0L\u2019\u00e9quipe des comptes \u00a0<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em>Votre messagerie , votre identifiant, votre mot de passe, Confirmation votre identit\u00e9.\u00a0\u00bb<\/em><\/p>\n<p>Voir la copie d&rsquo;\u00e9cran ci-dessous et le texte complet plus bas. Bien entendu, ne r\u00e9pondez surtout pas \u00e0 ce genre de message. Quand\u00a0vous avez un doute, n&rsquo;h\u00e9sitez surtout \u00e0 demander conseil avant de r\u00e9pondre.<!--more--><\/p>\n<div id=\"attachment_864\" style=\"width: 430px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?ssl=1\"><img aria-describedby=\"caption-attachment-864\" loading=\"lazy\" class=\"wp-image-864\" src=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?resize=420%2C405&#038;ssl=1\" alt=\"Mail-frauduleux\" width=\"420\" height=\"405\" srcset=\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?resize=300%2C289&amp;ssl=1 300w, https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?w=717&amp;ssl=1 717w\" sizes=\"(max-width: 420px) 100vw, 420px\" data-recalc-dims=\"1\" \/><\/a><p id=\"caption-attachment-864\" class=\"wp-caption-text\">copie mail hamme\u00e7onnage<\/p><\/div>\n<p>&nbsp;<\/p>\n<div>Le 23 avr. 2015 \u00e0 01:33, L&rsquo;\u00e9quipe S\u00e9curit\u00e9 &lt;service_notificatioon@hotmail.com&gt; a \u00e9crit :<\/div>\n<p>&nbsp;<\/p>\n<blockquote>\n<div>\n<div class=\"ecxMHeader\">\n<div class=\"ecxMHeader\">\n<div class=\"ecxMTitle\">L\u2019\u00e9quipe des comptes<\/div>\n<div class=\"ecxMSubhead\">Votre messagerie , votre identifiant, votre mot de passe, Confirmation votre identit\u00e9.<\/div>\n<\/div>\n<\/div>\n<p><strong>Cher(e) Membre,<\/strong><\/p>\n<div>Pour des raisons de la congestion de tous les utilisateurs,\u00a0serait oblig\u00e9 de fermer votre compte ,\u00a0<span class=\"ecxapple-converted-space\">\u00a0<\/span>Vous devrez confirmer votre e-mail en remplissant vos informations de connexion ci-dessous au cas o\u00f9 le formulaire n\u2019est pas totalement rempli votre compte sera suspendu dans les 72 heures pour des raisons de s\u00e9curit\u00e9<span class=\"ecxapple-converted-space\">\u00a0<\/span><\/div>\n<div>\u25a0\u00a0Nom: &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/div>\n<p>\u25a0\u00a0Pr\u00e9nom:&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n<p>\u25a0\u00a0Date de Naissance :&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n<p>\u25a0\u00a0Adresse \u00a0E-mails:&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n<p>\u25a0\u00a0Mot de Passe Obligatoire :&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n<p>INFORMATIONS<\/p>\n<div>Important :<span class=\"ecxapple-converted-space\">\u00a0<\/span>L&rsquo;utilisateur est pri\u00e9 de bien vouloir nous fournir son mot de passe, car sans le mot de passe nous ne pourrions en aucun cas proc\u00e9der \u00e0 la v\u00e9rification de son compte<\/div>\n<div>NB: Veuillez confirmer votre mot de passe et votre adresse de messagerie secours en nous envoyant les informations demand\u00e9es ,\u00a0\u00ae dans un d\u00e9lai de 24 Heures.\u00a0 Apr\u00e8s avoir r\u00e9pondu au questionnaire et apr\u00e8s v\u00e9rification par nos services votre compte continuera de fonctionner normalement. Tout refus de coop\u00e9ration entra\u00eene la suppression syst\u00e9matique du compte\u00a0Tout en nous excusant pour ces d\u00e9sagr\u00e9ments.<\/div>\n<p>Nous esp\u00e9rons que vous appr\u00e9cierez votre messagerie.<\/p>\n<p class=\"ecxMsoNormal\">L&rsquo;\u00e9quipe\u00a0S\u00e9curit\u00e9<\/p>\n<\/div>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Une des attaques les plus ridicules que j&rsquo;ai re\u00e7ues\u00a0ces derniers jours me demandant : \u00ab\u00a0L\u2019\u00e9quipe des comptes \u00a0 Votre messagerie , votre identifiant, votre mot de passe, Confirmation votre identit\u00e9.\u00a0\u00bb Voir la copie d&rsquo;\u00e9cran ci-dessous et le texte complet plus bas. Bien entendu, ne r\u00e9pondez surtout pas \u00e0 ce genre de message. Quand\u00a0vous avez un [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"og:description\" content=\"Une des attaques les plus ridicules que j&rsquo;ai re\u00e7ues\u00a0ces derniers jours me demandant : \u00ab\u00a0L\u2019\u00e9quipe des comptes \u00a0 Votre messagerie , votre identifiant, votre mot de passe, Confirmation votre identit\u00e9.\u00a0\u00bb Voir la copie d&rsquo;\u00e9cran ci-dessous et le texte complet plus bas. Bien entendu, ne r\u00e9pondez surtout pas \u00e0 ce genre de message. Quand\u00a0vous avez un [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux\" \/>\n<meta property=\"og:site_name\" content=\"Mes Notes, Astuces &amp; Conseils informatiques\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dsconsultant.net\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-24T19:12:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-04-25T19:12:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux-300x289.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dominique Schos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\",\"url\":\"https:\/\/dsconsultant.net\/blog\/\",\"name\":\"Mes Notes, Astuces &amp; Conseils informatiques\",\"description\":\"Dominique Schos Consultant Conseil informatique Maroc\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?fit=717%2C693&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?fit=717%2C693&ssl=1\",\"width\":717,\"height\":693},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#webpage\",\"url\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux\",\"name\":\"Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques\",\"isPartOf\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#primaryimage\"},\"datePublished\":\"2015-04-24T19:12:19+00:00\",\"dateModified\":\"2015-04-25T19:12:30+00:00\",\"author\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/dsconsultant.net\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attention : mail frauduleux\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92\",\"name\":\"Dominique Schos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g\",\"caption\":\"Dominique Schos\"},\"description\":\"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \\\"Tchat\\\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \\\"flirter\\\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...\",\"sameAs\":[\"https:\/\/www.dsconsultant.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux","og_locale":"fr_FR","og_type":"article","og_title":"Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques","og_description":"Une des attaques les plus ridicules que j&rsquo;ai re\u00e7ues\u00a0ces derniers jours me demandant : \u00ab\u00a0L\u2019\u00e9quipe des comptes \u00a0 Votre messagerie , votre identifiant, votre mot de passe, Confirmation votre identit\u00e9.\u00a0\u00bb Voir la copie d&rsquo;\u00e9cran ci-dessous et le texte complet plus bas. Bien entendu, ne r\u00e9pondez surtout pas \u00e0 ce genre de message. Quand\u00a0vous avez un [&hellip;]","og_url":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux","og_site_name":"Mes Notes, Astuces &amp; Conseils informatiques","article_publisher":"https:\/\/www.facebook.com\/dsconsultant.net\/","article_published_time":"2015-04-24T19:12:19+00:00","article_modified_time":"2015-04-25T19:12:30+00:00","og_image":[{"url":"https:\/\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux-300x289.png"}],"twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Dominique Schos","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/dsconsultant.net\/blog\/#website","url":"https:\/\/dsconsultant.net\/blog\/","name":"Mes Notes, Astuces &amp; Conseils informatiques","description":"Dominique Schos Consultant Conseil informatique Maroc","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsconsultant.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#primaryimage","url":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?fit=717%2C693&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dsconsultant.net\/blog\/wp-content\/uploads\/Mail-frauduleux.png?fit=717%2C693&ssl=1","width":717,"height":693},{"@type":"WebPage","@id":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#webpage","url":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux","name":"Attention : mail frauduleux - Mes Notes, Astuces &amp; Conseils informatiques","isPartOf":{"@id":"https:\/\/dsconsultant.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#primaryimage"},"datePublished":"2015-04-24T19:12:19+00:00","dateModified":"2015-04-25T19:12:30+00:00","author":{"@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92"},"breadcrumb":{"@id":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dsconsultant.net\/blog\/internet\/attention-mail-frauduleux#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/dsconsultant.net\/blog"},{"@type":"ListItem","position":2,"name":"Attention : mail frauduleux"}]},{"@type":"Person","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/09f4f57c32b2145fdea40e17b1ea7e92","name":"Dominique Schos","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/dsconsultant.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5df6b5e6cea471da661f13bc21e3e889?s=96&d=mm&r=g","caption":"Dominique Schos"},"description":"De MacOS 1.0 en 1984 \u00e0 OSX12 Monteray en passant par le mythique OSX, de MS-DOS 1 \u00e0 Windows11, de IOS Apple \u00e0 Android, des premiers \"Tchat\" sur ICQ \u00e0 Facebook Live, je ne me lasse pas de \"flirter\" avec ces technologies et moyens de communications que j'aime mettre \u00e0 votre service...","sameAs":["https:\/\/www.dsconsultant.net"]}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/863"}],"collection":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/comments?post=863"}],"version-history":[{"count":0,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/posts\/863\/revisions"}],"wp:attachment":[{"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/media?parent=863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/categories?post=863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsconsultant.net\/blog\/wp-json\/wp\/v2\/tags?post=863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}