{"id":3460,"date":"2016-09-28T16:32:00","date_gmt":"2016-09-28T14:32:00","guid":{"rendered":"https:\/\/test-blog.mailfence.com\/?p=3460"},"modified":"2024-07-29T11:30:16","modified_gmt":"2024-07-29T09:30:16","slug":"conseils-de-securite-piratage-yahoo","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/","title":{"rendered":"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">L\u2019ann\u00e9e derni\u00e8re, <\/span><a href=\"https:\/\/help.yahoo.com\/kb\/account\/SLN27925.html?impressions=true\"><span style=\"font-weight: 400;\">Yahoo a admis<\/span><\/a><span style=\"font-weight: 400;\"> qu\u2019elle avait \u00e9t\u00e9 victime d\u2019une violation massive portant sur plus de 500 millions de comptes de messagerie, y compris les identifiants et les questions de s\u00e9curit\u00e9. <\/span><span style=\"font-weight: 400;\">Chez Mailfence &#8211; un service de messagerie <\/span><a href=\"https:\/\/mailfence.com\/fr\/email-securise.jsp\"><span style=\"font-weight: 400;\">s\u00e9curis\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> et <\/span><a href=\"https:\/\/mailfence.com\/fr\/email-prive.jsp\"><span style=\"font-weight: 400;\">priv\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; l&rsquo;\u00e9quipe de s\u00e9curit\u00e9 a suivi de pr\u00e8s les d\u00e9veloppements de cette affaire, et ce <\/span><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/aeknw5\/yahoo-supposed-data-breach-200-million-credentials-dark-web\"><span style=\"font-weight: 400;\">d\u00e8s les premiers soup\u00e7ons<\/span><\/a><span style=\"font-weight: 400;\">. Elle a aussi analys\u00e9 l&rsquo;impact qu&rsquo;une telle attaque pourrait avoir sur nos utilisateurs. En cons\u00e9quence, nous avons d\u00e9cid\u00e9 de publier ces conseils de s\u00e9curit\u00e9 g\u00e9n\u00e9raux concernant le piratage de Yahoo.<\/span><\/p>\n<h2>Voici donc nos conseils de s\u00e9curit\u00e9 sur la conduite \u00e0 tenir en fonction de votre situation :<\/h2>\n<ol>\n<li><span style=\"font-weight: 400;\">Si l&rsquo;adresse de votre compte de secours est une adresse email Yahoo, cela signifie que le piratage de votre adresse Yahoo pourrait entra\u00eener un piratage de votre compte Mailfence. Nous vous recommandons donc de <\/span><b>changer le mot de passe de votre compte email Yahoo et de d\u00e9sactiver les questions de s\u00e9curit\u00e9.<\/b><\/li>\n<li><span style=\"font-weight: 400;\">Si vous aviez associ\u00e9 un compte de secours Mailfence \u00e0 votre adresse Yahoo qui a \u00e9t\u00e9 pirat\u00e9e, alors il peut avoir \u00e9t\u00e9 chang\u00e9 (sans m\u00eame que vous vous en soyez rendu compte).\u00a0Dans ce cas, vous pourriez ne plus \u00eatre en mesure d&rsquo;utiliser votre compte Mailfence pour r\u00e9cup\u00e9rer votre compte Yahoo. Par cons\u00e9quent, <\/span><b>v\u00e9rifiez dans la liste de vos comptes d\u2019email de secours de votre compte Yahoo qu&rsquo;ils n&rsquo;ont pas \u00e9t\u00e9 modifi\u00e9s<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Si vous utilisez le m\u00eame mot de passe que celui que vous employez pour Yahoo pour votre compte Mailfence OU pour tout autre service, nous vous recommandons de <\/span><b>modifier tous ces mots de passe et d&rsquo;utiliser d<\/b><a href=\"https:\/\/blog.mailfence.com\/fr\/5-pires-habitudes-de-mot-de-passe\/\"><b>es mots de passe diff\u00e9rents et forts<\/b><\/a><b> pour chacun des services que vous utilisez.<\/b><\/li>\n<li><b>Mettez en place <\/b><b>une authentification \u00e0 deux facteurs <\/b><span style=\"font-weight: 400;\">pour vos comptes Mailfence ou autres pour une s\u00e9curit\u00e9 optimale. V\u00e9rifiez aussi que votre compte ne figure pas sur les sites <\/span><a href=\"https:\/\/haveibeenpwned.com\/\"><span style=\"font-weight: 400;\">haveibeenpawned<\/span><\/a><span style=\"font-weight: 400;\"> \/ <\/span><a href=\"https:\/\/breachalarm.com\/\"><span style=\"font-weight: 400;\">breachalarm<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Notre \u00e9quipe de s\u00e9curit\u00e9 continuera \u00e0 surveiller les d\u00e9veloppements de ce type d\u2019affaire et \u00e0 tenir les utilisateurs inform\u00e9s quand ce sera n\u00e9cessaire.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vous avez des questions? N&rsquo;h\u00e9sitez pas \u00e0 nous contacter.<\/span><\/p>\n<p style=\"text-align: center;\">[maxbutton id=\u00a0\u00bb14&Prime; ]<\/p>\n<hr \/>\n<div>\n<h3 class=\"widget-title\" style=\"text-align: center;\">Faites passer le message !<\/h3>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019ann\u00e9e derni\u00e8re, Yahoo a admis qu\u2019elle avait \u00e9t\u00e9 victime d\u2019une violation massive portant sur plus de 500 millions de comptes de messagerie, y compris les identifiants et les questions de s\u00e9curit\u00e9. Chez Mailfence &#8211; un service de messagerie s\u00e9curis\u00e9 et priv\u00e9 &#8211; l&rsquo;\u00e9quipe de s\u00e9curit\u00e9 a suivi de pr\u00e8s les d\u00e9veloppements de cette affaire, et [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":85921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18591,27],"tags":[],"class_list":["post-3460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mailfence-news","category-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Conseils de s\u00e9curit\u00e9 de Mailfence suite au piratage de Yahoo<\/title>\n<meta name=\"description\" content=\"Chez Mailfence, nous avons suivi de pr\u00e8s l&#039;affaire du piratage de Yahoo, et nous avons d\u00e9cid\u00e9 de publier ces conseils de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-28T14:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T09:30:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"M Salman Nadeem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@0xSalman\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"M Salman Nadeem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/\"},\"author\":{\"name\":\"M Salman Nadeem\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\"},\"headline\":\"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo\",\"datePublished\":\"2016-09-28T14:32:00+00:00\",\"dateModified\":\"2024-07-29T09:30:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/\"},\"wordCount\":399,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/Security_advisory_regarding_yahoo_hack1.png\",\"articleSection\":[\"Quoi de neuf Mailfence\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/\",\"name\":\"Conseils de s\u00e9curit\u00e9 de Mailfence suite au piratage de Yahoo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/Security_advisory_regarding_yahoo_hack1.png\",\"datePublished\":\"2016-09-28T14:32:00+00:00\",\"dateModified\":\"2024-07-29T09:30:16+00:00\",\"description\":\"Chez Mailfence, nous avons suivi de pr\u00e8s l'affaire du piratage de Yahoo, et nous avons d\u00e9cid\u00e9 de publier ces conseils de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/Security_advisory_regarding_yahoo_hack1.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/Security_advisory_regarding_yahoo_hack1.png\",\"width\":600,\"height\":600,\"caption\":\"\\\"\\\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/conseils-de-securite-piratage-yahoo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quoi de neuf Mailfence\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/category\\\/mailfence-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/#\\\/schema\\\/person\\\/0a1800f7a6842b23ccef1107cec8c962\",\"name\":\"M Salman Nadeem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g\",\"caption\":\"M Salman Nadeem\"},\"description\":\"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.\",\"sameAs\":[\"www.linkedin.com\\\/in\\\/mohammadsalmannadeem\",\"https:\\\/\\\/x.com\\\/0xSalman\"],\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/fr\\\/author\\\/msalman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Conseils de s\u00e9curit\u00e9 de Mailfence suite au piratage de Yahoo","description":"Chez Mailfence, nous avons suivi de pr\u00e8s l'affaire du piratage de Yahoo, et nous avons d\u00e9cid\u00e9 de publier ces conseils de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/","og_locale":"fr_FR","og_type":"article","og_title":"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo | Mailfence Blog","og_description":"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2016-09-28T14:32:00+00:00","article_modified_time":"2024-07-29T09:30:16+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png","type":"image\/png"}],"author":"M Salman Nadeem","twitter_card":"summary_large_image","twitter_creator":"@0xSalman","twitter_site":"@mailfence","twitter_misc":{"\u00c9crit par":"M Salman Nadeem","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/"},"author":{"name":"M Salman Nadeem","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962"},"headline":"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo","datePublished":"2016-09-28T14:32:00+00:00","dateModified":"2024-07-29T09:30:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/"},"wordCount":399,"publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png","articleSection":["Quoi de neuf Mailfence","S\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/","url":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/","name":"Conseils de s\u00e9curit\u00e9 de Mailfence suite au piratage de Yahoo","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png","datePublished":"2016-09-28T14:32:00+00:00","dateModified":"2024-07-29T09:30:16+00:00","description":"Chez Mailfence, nous avons suivi de pr\u00e8s l'affaire du piratage de Yahoo, et nous avons d\u00e9cid\u00e9 de publier ces conseils de s\u00e9curit\u00e9.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2016\/09\/Security_advisory_regarding_yahoo_hack1.png","width":600,"height":600,"caption":"\"\""},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/fr\/conseils-de-securite-piratage-yahoo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Quoi de neuf Mailfence","item":"https:\/\/blog.mailfence.com\/fr\/category\/mailfence-news\/"},{"@type":"ListItem","position":3,"name":"Conseils de s\u00e9curit\u00e9 concernant le piratage de Yahoo"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/fr\/#website","url":"https:\/\/blog.mailfence.com\/fr\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/fr\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/fr\/#\/schema\/person\/0a1800f7a6842b23ccef1107cec8c962","name":"M Salman Nadeem","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b713e04b38c2f304dd32931299f537e1085a85b9d80a5a1d2b27063338033e41?s=96&d=blank&r=g","caption":"M Salman Nadeem"},"description":"Salman works as an Information Security Analyst for Mailfence. His areas of interest include cryptography, security architecture and design, access control, and operations security. You can follow him on LinkedIn @mohammadsalmannadeem.","sameAs":["www.linkedin.com\/in\/mohammadsalmannadeem","https:\/\/x.com\/0xSalman"],"url":"https:\/\/blog.mailfence.com\/fr\/author\/msalman\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/3460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/comments?post=3460"}],"version-history":[{"count":6,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/3460\/revisions"}],"predecessor-version":[{"id":88368,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/posts\/3460\/revisions\/88368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media\/85921"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/media?parent=3460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/categories?post=3460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/fr\/wp-json\/wp\/v2\/tags?post=3460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}