{"version":"1.0","provider_name":"LockPassGen","provider_url":"https:\/\/lockpassgen.com\/blog","title":"Les nouvelles menaces li\u00e9es \u00e0 la pirates informatiques - LockPassGen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"UgWRLFHhMn\"><a href=\"https:\/\/lockpassgen.com\/blog\/les-nouvelles-menaces-liees-a-la-pirates-informatiques\/\">Les nouvelles menaces li\u00e9es \u00e0 la pirates informatiques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lockpassgen.com\/blog\/les-nouvelles-menaces-liees-a-la-pirates-informatiques\/embed\/#?secret=UgWRLFHhMn\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Les nouvelles menaces li\u00e9es \u00e0 la pirates informatiques\u00a0\u00bb &#8212; LockPassGen\" data-secret=\"UgWRLFHhMn\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/lockpassgen.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Les nouvelles menaces li\u00e9es \u00e0 la piraterie informatique : une \u00e9volution constante La piraterie informatique, \u00e9galement connue sous le nom de cyberattaque, est une menace croissante pour les individus, les entreprises et les organismes gouvernementaux. Les pirates informatiques utilisent des techniques de plus en plus sophistiqu\u00e9es pour acc\u00e9der \u00e0 des informations sensibles, voler des donn\u00e9es..."}