{"id":17602,"date":"2020-09-09T16:00:12","date_gmt":"2020-09-09T20:00:12","guid":{"rendered":"https:\/\/adf-magazine.com\/?p=17602"},"modified":"2020-09-09T15:07:42","modified_gmt":"2020-09-09T19:07:42","slug":"les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite","status":"publish","type":"post","link":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/","title":{"rendered":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9"},"content":{"rendered":"<p style=\"margin: 0in 0in 12pt; font-size: medium; font-family: 'Times New Roman', serif; caret-color: #000000; color: #000000; line-height: 24px;\"><span lang=\"FR\" style=\"font-size: 9pt; line-height: 18px;\">PERSONNEL D\u2019<i>ADF<\/i><\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Les experts en cybers\u00e9curit\u00e9 d\u00e9clarent que la premi\u00e8re marque de smartphone d\u2019Afrique a vendu des dizaines de milliers de t\u00e9l\u00e9phones contenant un logiciel malveillant. Ces t\u00e9l\u00e9phones drainent les donn\u00e9es des utilisateurs, les inscrivent \u00e0 des services d\u2019abonnement sans qu\u2019ils le sachent, et les rendent complices malgr\u00e9 eux de stratag\u00e8mes publicitaires frauduleux.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Le maliciel Triada a \u00e9t\u00e9 d\u00e9couvert sur les smartphones Tecno W2 de fabrication chinoise en \u00c9thiopie, au Cameroun, au Ghana et en Afrique du Sud, selon un rapport r\u00e9cent. Triada utilise un programme difficile \u00e0 \u00e9liminer appel\u00e9 x-Helper pour effectuer ses basses \u0153uvres, selon les experts.<\/span><\/p>\n<p style=\"margin: 0in 0in 8pt; font-size: medium; font-family: 'Times New Roman', serif; caret-color: #000000; color: #000000; line-height: 24px; vertical-align: baseline;\"><span lang=\"FR\" style=\"color: #333333;\">En plus de cr\u00e9er des abonnements fictifs, le maliciel produit de faux clics sur les banni\u00e8res publicitaires \u00e0 l\u2019arri\u00e8re-plan des sites pour faire gagner des millions de dollars aux cybercriminels en escroquant les annonceurs avec des demandes frauduleuses.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Puisque les gens conduisent de plus en plus de transactions par smartphone, la situation soul\u00e8ve des questions concernant la fiabilit\u00e9 de la technologie fabriqu\u00e9e en Chine, et sur la fa\u00e7on dont elle peut \u00eatre utilis\u00e9e pour recueillir les donn\u00e9es personnelles et espionner les utilisateurs.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; font-size: 11pt; font-family: Calibri, sans-serif; line-height: 22px; caret-color: #000000; color: #000000; background-color: #fefefe;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">\u00ab\u00a0Le cheval de Troie xHelper persiste lors des red\u00e9marrages, des suppressions d\u2019applications et m\u00eame des r\u00e9initialisations d\u2019usine, ce qui le rend extr\u00eamement difficile \u00e0 d\u00e9loger, m\u00eame pour les professionnels exp\u00e9riment\u00e9s, sans parler de l\u2019utilisateur moyen\u00a0\u00bb, d\u00e9clare la soci\u00e9t\u00e9 de technologie mobile Upstream, qui a des bureaux en Afrique du Sud et au Nigeria.<\/span><\/p>\n<p style=\"margin: 0in 0in 8pt; font-size: medium; font-family: 'Times New Roman', serif; caret-color: #000000; color: #000000; line-height: 24px; vertical-align: baseline;\"><span lang=\"FR\">\u00a0Gr\u00e2ce \u00e0 sa plateforme anti-fraude Secure-D, Upstream a d\u00e9couvert 19,2 millions de transactions suspectes depuis mars 2019, provenant de plus de 200.000 appareils diff\u00e9rents, dont la plupart avaient \u00e9t\u00e9 vendus \u00e0 des personnes \u00e0 faible revenu cherchant un smartphone \u00e9conomique.<\/span><\/p>\n<p style=\"margin: 0in 0in 8pt; font-size: medium; font-family: 'Times New Roman', serif; caret-color: #000000; color: #000000; line-height: 24px; vertical-align: baseline;\"><span lang=\"FR\">\u00ab\u00a0\u00c9tant donn\u00e9 que de nombreux mod\u00e8les de t\u00e9l\u00e9phones Android d\u2019un prix accessible sont con\u00e7us pour les march\u00e9s \u00e9mergents, les arnaqueurs peuvent les utiliser pour cibler les utilisateurs qui d\u00e9pendent du cr\u00e9dit mobile pr\u00e9pay\u00e9 pour faire des achats avec leur t\u00e9l\u00e9phone\u00a0\u00bb, selon le rapport d\u2019analyse d\u2019Upstream.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Transsion, la soci\u00e9t\u00e9-m\u00e8re de Tecno, domine les secteurs des prix faibles et interm\u00e9diaires des march\u00e9s de smartphones en Afrique. Elle a enregistr\u00e9 une croissance rapide au cours des derni\u00e8res ann\u00e9es et sa part du march\u00e9 africain des smartphones est aujourd\u2019hui de 41\u00a0%. La soci\u00e9t\u00e9 a d\u00e9clar\u00e9 que le maliciel avait \u00e9t\u00e9 charg\u00e9 apr\u00e8s que les t\u00e9l\u00e9phones aient quitt\u00e9 l\u2019usine et a offert un correctif pour r\u00e9soudre le probl\u00e8me.\u00a0<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Cela n\u2019est pas la premi\u00e8re fois que les Africains ont d\u00fb affronter un comportement suspect d\u2019une technologie originaire de la Chine.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">En 2017, les responsables de l\u2019Union africaine d\u00e9couvrirent que pendant cinq ann\u00e9es les serveurs fabriqu\u00e9s et install\u00e9s gratuitement par le gouvernement chinois avaient transf\u00e9r\u00e9 de vastes quantit\u00e9s de donn\u00e9es chaque nuit depuis le si\u00e8ge social de l\u2019UA \u00e0 Addis-Abeba (\u00c9thiopie), construit par la Chine en 2012, vers des serveurs de Shanghai. En 2018, l\u2019UA rempla\u00e7a les serveurs, en refusant l\u2019offre chinoise de l\u2019aider \u00e0 les configurer.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Cette ann\u00e9e, l\u2019appli populaire TikTok fabriqu\u00e9e en Chine a \u00e9t\u00e9 accus\u00e9e d\u2019acheminer les donn\u00e9es des utilisateurs par des serveurs bas\u00e9s en Chine et de coop\u00e9rer avec le Parti communiste chinois (PCC) dans le cadre d\u2019une strat\u00e9gie mondiale de surveillance.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Dans une entr\u00e9e sur Twitter en juillet, les experts en s\u00e9curit\u00e9 des donn\u00e9es de ProtonMail ont averti que TikTok avait le potentiel de faciliter une surveillance massive par les autorit\u00e9s chinoises.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">\u00ab\u00a0Notre point de vue sur #TikTok\u00a0: faites attention\u00a0\u00bb, \u00e9crit ProtonMail. \u00ab\u00a0Ce g\u00e9ant des r\u00e9seaux sociaux non seulement recueille une quantit\u00e9 \u00e9norme de donn\u00e9es personnelles vous concernant (parfois sans que vous le sachiez), mais coop\u00e8re aussi avec le PCC, pour amplifier la port\u00e9e de la surveillance et de la censure de la Chine au-del\u00e0 de ses fronti\u00e8res.\u00a0\u00bb<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">TikTok a \u00e9t\u00e9 interdite en Inde \u00e0 la fin juin, ainsi que des douzaines d\u2019autres applis chinoises, notamment la messagerie WeChat. Le gouvernement indien a proclam\u00e9 que ces applis constituaient une menace pour la souverainet\u00e9 nationale.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Un grand nombre de pays africains ont du retard pour prendre des mesures de cybers\u00e9curit\u00e9,\u00a0<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Un rapport de 2018 publi\u00e9 par l\u2019Union africaine indique que 8 pays seulement ont d\u00e9clar\u00e9 poss\u00e9der une strat\u00e9gie nationale de cybers\u00e9curit\u00e9. 14 seulement ont des lois prot\u00e9geant les donn\u00e9es personnelles de leurs citoyens en ligne. Le m\u00eame rapport indique que les pays africains sont la source de centaines de milliers d\u2019attaques cybern\u00e9tiques chaque ann\u00e9e dans le monde.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">En 2014, l\u2019UA a adopt\u00e9 sa Convention sur la cybers\u00e9curit\u00e9 et la protection des donn\u00e9es pour essayer de d\u00e9velopper une base l\u00e9gale pour prot\u00e9ger les citoyens en ligne. L\u2019UA a lanc\u00e9 son groupe d\u2019experts en cybers\u00e9curit\u00e9, constitu\u00e9 de 10 membres, en d\u00e9cembre 2019 pour conseiller aux leaders de l\u2019union comment r\u00e9pondre au mieux aux menaces de s\u00e9curit\u00e9 en ligne.<\/span><\/p>\n<p class=\"MsoPlainText\" style=\"margin: 0in 0in 8pt; font-size: 11pt; font-family: Calibri, sans-serif; caret-color: #000000; color: #000000; line-height: 22px;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">Le Nig\u00e9rian Abdul-Hakeem Ajijola, pr\u00e9sident du groupe d\u2019experts, d\u00e9clare que la br\u00e8che de s\u00e9curit\u00e9 de Tecno est un coup de semonce. Il ne pense pas que les probl\u00e8mes sont limit\u00e9s aux t\u00e9l\u00e9phones d\u2019un seul pays ou d\u2019un seul fabricant. En cons\u00e9quence, dit-il, les pays africains doivent d\u00e9velopper leurs propres capacit\u00e9s de chiffrage et de s\u00e9curit\u00e9 des donn\u00e9es pour prot\u00e9ger leurs citoyens.\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"margin: 0in 0in 10pt; font-size: 11pt; font-family: Calibri, sans-serif; line-height: 22px; caret-color: #000000; color: #000000;\"><span lang=\"FR\" style=\"font-size: 12pt; line-height: 24px; font-family: 'Times New Roman', serif;\">\u00ab\u00a0L\u2019Afrique doit lancer et soutenir le d\u00e9veloppement des capacit\u00e9s de personnel, de processus et de technologie\u00a0\u00bb, d\u00e9clare-t-il \u00e0\u00a0<i>ADF<\/i>\u00a0dans un e-mail. \u00ab\u00a0Nous devons encourager et faciliter le secteur priv\u00e9 en tant que principal agent de d\u00e9veloppement et de d\u00e9ploiement de la technologie, alors que les gouvernements assurent le fair-play, le traitement \u00e9quitable et la conformit\u00e9 \u00e0 la r\u00e9glementation.\u00a0\u00bb<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PERSONNEL D\u2019ADF Les experts en cybers\u00e9curit\u00e9 d\u00e9clarent que la premi\u00e8re marque de smartphone d\u2019Afrique a vendu des dizaines de milliers de t\u00e9l\u00e9phones contenant un logiciel malveillant. Ces t\u00e9l\u00e9phones drainent les donn\u00e9es des utilisateurs, les inscrivent \u00e0 des services d\u2019abonnement sans qu\u2019ils le sachent, et les rendent complices malgr\u00e9 eux de stratag\u00e8mes publicitaires frauduleux. Le maliciel<\/p>\n","protected":false},"author":1,"featured_media":17599,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[331],"tags":[],"class_list":{"0":"post-17602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-dernieres-nouvelles"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum\" \/>\n<meta property=\"og:description\" content=\"PERSONNEL D\u2019ADF Les experts en cybers\u00e9curit\u00e9 d\u00e9clarent que la premi\u00e8re marque de smartphone d\u2019Afrique a vendu des dizaines de milliers de t\u00e9l\u00e9phones contenant un logiciel malveillant. Ces t\u00e9l\u00e9phones drainent les donn\u00e9es des utilisateurs, les inscrivent \u00e0 des services d\u2019abonnement sans qu\u2019ils le sachent, et les rendent complices malgr\u00e9 eux de stratag\u00e8mes publicitaires frauduleux. Le maliciel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Africa Defense Forum\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ADFmagazine\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-09T20:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ADF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:site\" content=\"@ADFmagazine\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"ADF\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/\"},\"author\":{\"name\":\"ADF\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"headline\":\"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9\",\"datePublished\":\"2020-09-09T20:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/\"},\"wordCount\":1034,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/GettyImages-1064245162.jpg\",\"articleSection\":[\"Actualit\u00e9s du Jour\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/\",\"name\":\"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/GettyImages-1064245162.jpg\",\"datePublished\":\"2020-09-09T20:00:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/GettyImages-1064245162.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/GettyImages-1064245162.jpg\",\"width\":1080,\"height\":720,\"caption\":\"Residents of several African countries have been unwitting accomplices to cyber criminals by using malware installed on Chinese-made cellphones. AFP\\\/GETTY IMAGES\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/2020\\\/09\\\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"page d\u2019accueil\",\"item\":\"https:\\\/\\\/adf-magazine.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#website\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/\",\"name\":\"Africa Defense Forum\",\"description\":\"Africa Defense Forum\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adf-magazine.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/#\\\/schema\\\/person\\\/f266a6061389568b5a11465bb38bc025\",\"name\":\"ADF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"url\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"contentUrl\":\"https:\\\/\\\/adf-magazine.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/cropped-ADF_icon.jpg\",\"caption\":\"ADF\"},\"description\":\"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/ADFmagazine\"],\"url\":\"https:\\\/\\\/adf-magazine.com\\\/fr\\\/author\\\/adf\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum","og_description":"PERSONNEL D\u2019ADF Les experts en cybers\u00e9curit\u00e9 d\u00e9clarent que la premi\u00e8re marque de smartphone d\u2019Afrique a vendu des dizaines de milliers de t\u00e9l\u00e9phones contenant un logiciel malveillant. Ces t\u00e9l\u00e9phones drainent les donn\u00e9es des utilisateurs, les inscrivent \u00e0 des services d\u2019abonnement sans qu\u2019ils le sachent, et les rendent complices malgr\u00e9 eux de stratag\u00e8mes publicitaires frauduleux. Le maliciel","og_url":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/","og_site_name":"Africa Defense Forum","article_publisher":"https:\/\/www.facebook.com\/ADFmagazine\/","article_published_time":"2020-09-09T20:00:12+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg","type":"image\/jpeg"}],"author":"ADF","twitter_card":"summary_large_image","twitter_creator":"@ADFmagazine","twitter_site":"@ADFmagazine","twitter_misc":{"\u00c9crit par":"ADF","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#article","isPartOf":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/"},"author":{"name":"ADF","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"headline":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9","datePublished":"2020-09-09T20:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/"},"wordCount":1034,"commentCount":0,"image":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg","articleSection":["Actualit\u00e9s du Jour"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/","url":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/","name":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9 - Africa Defense Forum","isPartOf":{"@id":"https:\/\/adf-magazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#primaryimage"},"image":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg","datePublished":"2020-09-09T20:00:12+00:00","author":{"@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025"},"breadcrumb":{"@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#primaryimage","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/09\/GettyImages-1064245162.jpg","width":1080,"height":720,"caption":"Residents of several African countries have been unwitting accomplices to cyber criminals by using malware installed on Chinese-made cellphones. AFP\/GETTY IMAGES"},{"@type":"BreadcrumbList","@id":"https:\/\/adf-magazine.com\/fr\/2020\/09\/les-telephones-infectes-par-un-maliciel-posent-des-questions-de-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"page d\u2019accueil","item":"https:\/\/adf-magazine.com\/"},{"@type":"ListItem","position":2,"name":"Les t\u00e9l\u00e9phones infect\u00e9s par un maliciel posent des questions de s\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/adf-magazine.com\/#website","url":"https:\/\/adf-magazine.com\/","name":"Africa Defense Forum","description":"Africa Defense Forum","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adf-magazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/adf-magazine.com\/#\/schema\/person\/f266a6061389568b5a11465bb38bc025","name":"ADF","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","url":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","contentUrl":"https:\/\/adf-magazine.com\/wp-content\/uploads\/2020\/05\/cropped-ADF_icon.jpg","caption":"ADF"},"description":"ADF is a professional military magazine published quarterly by U.S. Africa Command to provide an international forum for African security professionals. ADF covers topics such as counter terrorism strategies, security and defense operations, transnational crime, and all other issues affecting peace, stability, and good governance on the African continent.","sameAs":["https:\/\/x.com\/ADFmagazine"],"url":"https:\/\/adf-magazine.com\/fr\/author\/adf\/"}]}},"_links":{"self":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts\/17602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/comments?post=17602"}],"version-history":[{"count":0,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/posts\/17602\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/media\/17599"}],"wp:attachment":[{"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/media?parent=17602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/categories?post=17602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adf-magazine.com\/fr\/wp-json\/wp\/v2\/tags?post=17602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}