{"version":"1.0","provider_name":"LockPassGen","provider_url":"https:\/\/lockpassgen.com\/blog","title":"Zoom sur les failles courantes en s\u00e9curit\u00e9 informatique - LockPassGen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1kvc0fYOkY\"><a href=\"https:\/\/lockpassgen.com\/blog\/zoom-sur-les-failles-courantes-en-securite-informatique\/\">Zoom sur les failles courantes en s\u00e9curit\u00e9 informatique<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lockpassgen.com\/blog\/zoom-sur-les-failles-courantes-en-securite-informatique\/embed\/#?secret=1kvc0fYOkY\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Zoom sur les failles courantes en s\u00e9curit\u00e9 informatique\u00a0\u00bb &#8212; LockPassGen\" data-secret=\"1kvc0fYOkY\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/lockpassgen.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Zoom sur les failles courantes en s\u00e9curit\u00e9 informatique Dans un monde o\u00f9 la technologie avance \u00e0 pas de g\u00e9ant, la s\u00e9curit\u00e9 informatique est devenue une pr\u00e9occupation majeure pour les individus et les organisations. Les menaces informatiques se sont multipli\u00e9es et sont devenues de plus en plus sophistiqu\u00e9es, mettant en danger la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et la..."}