{"version":"1.0","provider_name":"CISTEC","provider_url":"https:\/\/www.cistec.com\/fr\/","title":"LES DANGERS DES CYBERATTAQUES - CISTEC","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vWjabdO4Af\"><a href=\"https:\/\/www.cistec.com\/fr\/cyperattaques\/\">LES DANGERS DES CYBERATTAQUES<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cistec.com\/fr\/cyperattaques\/embed\/#?secret=vWjabdO4Af\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0LES DANGERS DES CYBERATTAQUES\u00a0\u00bb &#8212; CISTEC\" data-secret=\"vWjabdO4Af\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.cistec.com\/wp-content\/uploads\/2023\/03\/2.jpg","thumbnail_width":956,"thumbnail_height":650,"description":"En 1989, lors de la cr\u00e9ation du World Wide Web, personne n\u2019aurait pu imaginer que la mise en r\u00e9seau de toute sortes d\u2019ordinateurs \u00e0 l\u2019\u00e9chelle mondiale deviendrait un risque majeur pour la soci\u00e9t\u00e9. Le nombre d\u2019appareils connect\u00e9s ne cesse d\u2019augmenter chaque jour. Des milliards d\u2019appareils suppl\u00e9mentaires viendront s\u2019y ajouter au cours des prochaines ann\u00e9es et [&hellip;]"}