{"id":6230,"date":"2016-10-25T10:43:02","date_gmt":"2016-10-25T10:43:02","guid":{"rendered":"https:\/\/kasperskydaily.com\/france\/?p=6230"},"modified":"2017-09-24T11:58:31","modified_gmt":"2017-09-24T11:58:31","slug":"ransomware-infographics","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/ransomware-infographics\/6230\/","title":{"rendered":"Infographie : ce que vous devez savoir sur les ransomwares"},"content":{"rendered":"<p>Les ransomwares ont sans doute suscit\u00e9 <a href=\"https:\/\/www.kaspersky.fr\/blog\/tag\/ransomware\/\" target=\"_blank\" rel=\"noopener\">plus d\u2019articles<\/a> sur le blog de Kaspersky Daily que n\u2019importe quel autre type de menace. Honn\u00eatement, nous avons publi\u00e9 tellement d\u2019articles, de conseils, et d\u2019astuces, que seuls nous, les f\u00e9rus de l\u2019informatique (et les bots des moteurs de recherche) pouvons tous les lire.<\/p>\n<p>Nous avons donc d\u00e9cid\u00e9 de nous pencher sur les principaux \u00e9l\u00e9ments cl\u00e9s dans l\u2019infographie ci-dessous. Vous souhaitez en savoir plus sur les ransomwares et comment vous en prot\u00e9ger\u00a0? Nous \u00e9crirons tr\u00e8s bient\u00f4t un article d\u00e9di\u00e9 aux ransomwares. Restez \u00e0 l\u2019\u00e9coute\u00a0!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6237\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/93\/2016\/10\/06094308\/Ransomware_FR-1.png\" alt=\"ransomware_fr\" width=\"2835\" height=\"11544\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les \u00e9l\u00e9ments cl\u00e9s des ransomwares et comment les \u00e9viter. <\/p>\n","protected":false},"author":40,"featured_media":6232,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,686],"tags":[522,316,200,204,1937],"class_list":{"0":"post-6230","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-chevaux-de-troie","10":"tag-chiffrement","11":"tag-infographie","12":"tag-menaces","13":"tag-verrouilleurs"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-infographics\/6230\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-infographics\/7858\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-infographics\/7898\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-infographics\/9401\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-infographics\/9226\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-infographics\/13464\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-infographics\/2567\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-infographics\/13315\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-infographics\/5581\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-infographics\/9063\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-infographics\/13223\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-infographics\/13464\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-infographics\/13315\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-infographics\/13315\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/chevaux-de-troie\/","name":"chevaux de troie"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/6230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=6230"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/6230\/revisions"}],"predecessor-version":[{"id":7198,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/6230\/revisions\/7198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/6232"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=6230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=6230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=6230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}