{"id":15287,"date":"2021-10-28T10:30:40","date_gmt":"2021-10-28T08:30:40","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=15287"},"modified":"2021-11-11T15:34:47","modified_gmt":"2021-11-11T14:34:47","slug":"smartphone-six-indices-revelent-un-piratage-informatique","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/fr\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","title":{"rendered":"Smartphone : Six indices r\u00e9v\u00e8lent une attaque de pirates informatiques"},"content":{"rendered":"<figure id=\"attachment_15288\" aria-describedby=\"caption-attachment-15288\" style=\"width: 400px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15288 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\" alt=\"NordVPN\" width=\"400\" height=\"267\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg 400w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-262x175.jpg 262w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-300x200.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-15288\" class=\"wp-caption-text\">Lorsque les hackers trafiquent les smartphones, souvent rien ne fonctionne. \u00a9 Polina Zimmermann \/ pexels.com<\/figcaption><\/figure>\n<p>L'augmentation du nombre d'attaques visant les smartphones n'est pas surprenante. Apr\u00e8s tout, les donn\u00e9es sensibles sont stock\u00e9es sur les t\u00e9l\u00e9phones mobiles de nos jours, et les pirates peuvent faire beaucoup de d\u00e9g\u00e2ts avec. Mais comment savoir si mon smartphone est concern\u00e9 ? Les six signes suivants d'un smartphone pirat\u00e9 identifi\u00e9s par NordVPN devraient inciter \u00e0 une v\u00e9rification approfondie de la s\u00e9curit\u00e9.<\/p>\n<ol>\n<li>\n<h2><strong> Perte s\u00e9v\u00e8re de performance<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Les derniers smartphones sont de v\u00e9ritables machines \u00e0 hautes performances. Si les performances baissent sans raison, il y a g\u00e9n\u00e9ralement un probl\u00e8me : des applications qui d\u00e9marrent tr\u00e8s lentement ou qui tournent au ralenti et une batterie qui se vide tr\u00e8s rapidement peuvent \u00eatre des indications d'un piratage : les logiciels malveillants et les logiciels de surveillance fonctionnent souvent de mani\u00e8re invisible en arri\u00e8re-plan et consomment des ressources.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong> Applications inconnues<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Les applications t\u00e9l\u00e9charg\u00e9es r\u00e9guli\u00e8rement, m\u00eame si elles proviennent de sources fiables, peuvent \u00eatre une porte d'entr\u00e9e pour les logiciels malveillants. De nombreuses applications gratuites vivent de la diffusion de publicit\u00e9s provenant de fournisseurs externes. Toutefois, gr\u00e2ce aux stations d'accueil correspondantes que les d\u00e9veloppeurs mettent en \u0153uvre dans le code de l'application, les pirates peuvent \u00e9galement avoir acc\u00e8s au t\u00e9l\u00e9phone portable. Si d'autres applications inconnues apparaissent apr\u00e8s l'installation d'une application, il peut y avoir une faille de s\u00e9curit\u00e9. Dans ce cas, les propri\u00e9taires de smartphones doivent v\u00e9rifier quelles applications qu'ils ont eux-m\u00eames t\u00e9l\u00e9charg\u00e9es ont l'autorisation d'installer d'autres applications. Garder un \u0153il sur votre propre catalogue d'applications fait \u00e9galement partie des r\u00e8gles de s\u00e9curit\u00e9 \u00e9l\u00e9mentaires.<\/p>\n<ol start=\"3\">\n<li>\n<h2><strong> Applications d\u00e9fectueuses<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Ce ne sont pas seulement les applications inconnues ou invisibles qui peuvent rendre \u00e9vident un acc\u00e8s \u00e9tranger au smartphone. Une attaque de pirates peut \u00e9galement \u00eatre \u00e0 l'origine d'une situation o\u00f9 tout semble normal au d\u00e9but, mais o\u00f9 des applications parfaitement op\u00e9rationnelles ne d\u00e9marrent plus ou ne se ferment plus pendant l'utilisation, sans raison apparente. Des achats in-app myst\u00e9rieux et des messages dans les programmes de messagerie qui ne proviennent pas de l'utilisateur sont \u00e9galement des signes possibles de l'exploitation d'une vuln\u00e9rabilit\u00e9. Les failles de s\u00e9curit\u00e9 dans le syst\u00e8me ou le comportement n\u00e9gligent des utilisateurs, comme l'ouverture inconsid\u00e9r\u00e9e de pi\u00e8ces jointes \u00e0 des courriels, sont les portes d'entr\u00e9e habituelles des cybercriminels.<\/p>\n<ol start=\"4\">\n<li>\n<h2><strong> Augmentation de la consommation de donn\u00e9es<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Un autre point qui peut indiquer la pr\u00e9sence d'un logiciel malveillant est une plus grande consommation de volume de donn\u00e9es. Si des nombres extr\u00eamement \u00e9lev\u00e9s de transferts de donn\u00e9es utilis\u00e9s ne peuvent \u00eatre expliqu\u00e9s, un logiciel de surveillance pourrait travailler en arri\u00e8re-plan. Afin d'\u00e9viter une escalade des co\u00fbts en cas de doute, les utilisateurs de smartphones devraient couper la connexion internet jusqu'\u00e0 ce que la faille de s\u00e9curit\u00e9 soit combl\u00e9e.<\/p>\n<ol start=\"5\">\n<li>\n<h2><strong> Une publicit\u00e9 inexplicable<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Tous ceux qui sont sur Internet les connaissent : les pop-ups. Malheureusement, ce type de publicit\u00e9 n'est pas non plus inconnu sur les smartphones. N\u00e9anmoins, il est plut\u00f4t inhabituel qu'un grand nombre de fen\u00eatres pop-up apparaissent soudainement \u00e0 l'\u00e9cran, alors qu'aucune application de navigation n'est en cours d'ex\u00e9cution. Un logiciel espion ou un logiciel malveillant pourrait alors en \u00eatre la cause.<\/p>\n<ol start=\"6\">\n<li>\n<h2><strong> Ph\u00e9nom\u00e8nes de cam\u00e9ra \u00e9tranges<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Le cas le plus atypique, mais en m\u00eame temps le plus sinistre, de piratage informatique est probablement directement li\u00e9 \u00e0 l'appareil photo du smartphone. Avec les t\u00e9l\u00e9phones pirat\u00e9s, on trouve parfois dans les dossiers de fichiers locaux des photos et des vid\u00e9os qui n'ont manifestement pas \u00e9t\u00e9 prises ou film\u00e9es par l'utilisateur. Le fait que la lampe flash s'allume et s'\u00e9teigne constamment toute seule est tout aussi \u00e9trange et constitue un autre signe d'acc\u00e8s par un tiers. En particulier, les logiciels pour les cam\u00e9ras et le mat\u00e9riel connexe consomment beaucoup de ressources. Par cons\u00e9quent, il y a g\u00e9n\u00e9ralement une accumulation de chaleur inexplicablement importante dans l'appareil.<\/p>\n<p>\"En cas de suspicion d'une attaque de pirates, le plus important est de ne pas paniquer\", souligne Joanna Rusin-Rohrig, Country Manager DACH chez NordVPN. \"Le premier pas vers la s\u00e9curit\u00e9 est de changer vos mots de passe. Ensuite, il est bon d'installer un logiciel anti-virus et de lancer une recherche de virus. En parall\u00e8le, les propri\u00e9taires de t\u00e9l\u00e9phones mobiles peuvent bien s\u00fbr aussi rep\u00e9rer eux-m\u00eames les applications suspectes et inconnues et les d\u00e9sinstaller. Si ces mesures n'aident pas ou insuffisamment, la derni\u00e8re option consiste \u00e0 r\u00e9initialiser le smartphone aux param\u00e8tres d'usine.\"<\/p>\n<p><em>Source : <a href=\"https:\/\/nordvpn.com\/de\/\">NordVPN<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die vermehrten Angriffe auf Smartphones \u00fcberraschen nicht, schliesslich liegen heutzutage besonders auf Handys sensible Daten, mit denen Hacker ziemlichen Schaden anrichten k\u00f6nnen. Doch wie finde ich heraus, ob mein Smartphone betroffen ist? Die folgenden sechs von NordVPN ermittelten Anzeichen f\u00fcr ein gehacktes Smartphone sollten einen gr\u00fcndlichen Sicherheitscheck nach sich ziehen. Starke Leistungseinbussen Gerade neueste Smartphones [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":15288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[5157],"class_list":["post-15287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-hackerangriff"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/fr\/smartphone-six-indices-revelent-un-piratage-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/fr\/smartphone-six-indices-revelent-un-piratage-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T08:30:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-11T14:34:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff\",\"datePublished\":\"2021-10-28T08:30:40+00:00\",\"dateModified\":\"2021-11-11T14:34:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"},\"wordCount\":633,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"keywords\":[\"Hackerangriff\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\",\"url\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\",\"name\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"datePublished\":\"2021-10-28T08:30:40+00:00\",\"dateModified\":\"2021-11-11T14:34:47+00:00\",\"description\":\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"width\":400,\"height\":267,\"caption\":\"Wenn Hacker sich am Smartphone zu schaffen machen, geht oft gar nichts mehr. \u00a9 Polina Zimmermann \/ pexels.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smartphone : Six indices r\u00e9v\u00e8lent une attaque de pirates informatiques - MQ Management und Qualit\u00e4t","description":"NordVPN a identifi\u00e9 six anomalies qui indiquent une attaque pirate sur le smartphone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/fr\/smartphone-six-indices-revelent-un-piratage-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t","og_description":"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.","og_url":"https:\/\/www.m-q.ch\/fr\/smartphone-six-indices-revelent-un-piratage-informatique\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-10-28T08:30:40+00:00","article_modified_time":"2021-11-11T14:34:47+00:00","og_image":[{"width":400,"height":267,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Roger Str\u00e4ssle","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Smartphone: Sechs Hinweise verraten einen Hackerangriff","datePublished":"2021-10-28T08:30:40+00:00","dateModified":"2021-11-11T14:34:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"},"wordCount":633,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","keywords":["Hackerangriff"],"articleSection":["Risikomanagement"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","url":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","name":"Smartphone : Six indices r\u00e9v\u00e8lent une attaque de pirates informatiques - MQ Management und Qualit\u00e4t","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","datePublished":"2021-10-28T08:30:40+00:00","dateModified":"2021-11-11T14:34:47+00:00","description":"NordVPN a identifi\u00e9 six anomalies qui indiquent une attaque pirate sur le smartphone.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","width":400,"height":267,"caption":"Wenn Hacker sich am Smartphone zu schaffen machen, geht oft gar nichts mehr. \u00a9 Polina Zimmermann \/ pexels.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Smartphone: Sechs Hinweise verraten einen Hackerangriff"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"Gestion et qualit\u00e9 du QM","description":"Plate-forme pour les syst\u00e8mes de gestion int\u00e9gr\u00e9e.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/fr\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/15287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/comments?post=15287"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/15287\/revisions"}],"predecessor-version":[{"id":15290,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/posts\/15287\/revisions\/15290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media\/15288"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/media?parent=15287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/categories?post=15287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/fr\/wp-json\/wp\/v2\/tags?post=15287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}