{"version":"1.0","provider_name":"LockPassGen","provider_url":"https:\/\/lockpassgen.com\/blog","title":"Zoom sur les failles courantes en pirates informatiques - LockPassGen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6u3k4gPLkB\"><a href=\"https:\/\/lockpassgen.com\/blog\/zoom-sur-les-failles-courantes-en-pirates-informatiques\/\">Zoom sur les failles courantes en pirates informatiques<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lockpassgen.com\/blog\/zoom-sur-les-failles-courantes-en-pirates-informatiques\/embed\/#?secret=6u3k4gPLkB\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Zoom sur les failles courantes en pirates informatiques\u00a0\u00bb &#8212; LockPassGen\" data-secret=\"6u3k4gPLkB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/lockpassgen.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Zoom sur les failles courantes en pirates informatiques Les pirates informatiques, \u00e9galement appel\u00e9s hackers, sont des individus qui utilisent leurs comp\u00e9tences en informatique pour acc\u00e9der \u00e0 des syst\u00e8mes, des r\u00e9seaux et des donn\u00e9es sans autorisation. Les failles courantes en pirates informatiques sont des vuln\u00e9rabilit\u00e9s qui peuvent \u00eatre exploit\u00e9es pour compromettre la s\u00e9curit\u00e9 d&rsquo;un syst\u00e8me ou..."}