{"version":"1.0","provider_name":"EENewsEurope","provider_url":"https:\/\/www.ecinews.fr\/fr\/","author_name":"Alain Dieul","author_url":"https:\/\/www.ecinews.fr\/fr\/author\/alaindieul\/","title":"Protection contre les logiciels malveillants","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"l8Tu7TzTkC\"><a href=\"https:\/\/www.ecinews.fr\/fr\/protection-contre-les-logiciels-malveillants\/\">Protection contre les logiciels malveillants<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ecinews.fr\/fr\/protection-contre-les-logiciels-malveillants\/embed\/#?secret=l8Tu7TzTkC\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Protection contre les logiciels malveillants\u00a0\u00bb &#8212; EENewsEurope\" data-secret=\"l8Tu7TzTkC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8519_microchip-scaled.jpg","thumbnail_width":2560,"thumbnail_height":1422,"description":"Face au d\u00e9veloppement rapide de la 5G supposant l\u2019installation de nouvelles infrastructures cellulaires, l\u2019expansion des r\u00e9seaux et des centres de donn\u00e9es pour permettre le d\u00e9veloppement de l\u2019informatique en nuage (cloud computing), les d\u00e9veloppeurs cherchent de nouveaux moyens de s\u2019assurer que les syst\u00e8mes d\u2019exploitation restent s\u00e9curis\u00e9s et sans faille. Microchip Technology Inc. annonce ce jour un nouveau microcontr\u00f4leur avec capacit\u00e9s de chiffrement, le microcontr\u00f4leur CEC1712 int\u00e9grant le firmware personnalis\u00e9 Soteria-G2, con\u00e7u pour arr\u00eater les logiciels malveillants de type rootkit et bootkit pour les syst\u00e8mes d\u00e9marrant sur une m\u00e9moire Flash externe de type SPI (Serial Peripheral Interface)."}