{"id":130710,"date":"2018-02-08T11:06:46","date_gmt":"2018-02-08T11:06:46","guid":{"rendered":"https:\/\/\/lantivirus-qui-trompe-les-pirates\/"},"modified":"2018-02-08T11:06:46","modified_gmt":"2018-02-08T11:06:46","slug":"lantivirus-qui-trompe-les-pirates","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/lantivirus-qui-trompe-les-pirates\/","title":{"rendered":"L&rsquo;antivirus qui trompe les pirates"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"fr\"><span title=\"According to Bahat, comparative studies of antiviruses showing 100% efficacy are all lies, tests are done in a lab environment, with all the features turned &quot;on&quot;.\">Selon Bahat, les \u00e9tudes comparatives d&rsquo;antivirus montrant une efficacit\u00e9 de 100% sont tous des mensonges, les tests sont effectu\u00e9s dans un environnement de laboratoire, avec toutes les fonctionnalit\u00e9s activ\u00e9es. <\/span><span title=\"But false positives are too high when all the features are &quot;on&quot;, no one use them all he argues.\n\n\">Mais les faux positifs sont trop \u00e9lev\u00e9s lorsque toutes les fonctionnalit\u00e9s sont activ\u00e9es etpersonne ne les utilise toutes.<\/span><\/span><br \/>\n<span id=\"result_box\" lang=\"fr\"><span title=\"&quot;I have a problem with the entire idea of detection, looking at a code and deciding if it is good or not. It doesn't matter how good detection is, it is an impossible task. With the evasive techniques they use, hackers have\">\u00ab\u00a0J&rsquo;ai un probl\u00e8me de base avec l&rsquo;id\u00e9e de d\u00e9tection; je regarde un code et je d\u00e9cide si c&rsquo;est bon ou pas, peu importe la qualit\u00e9 de la d\u00e9tection, c&rsquo;est une t\u00e2che impossible. Avec les techniques qu&rsquo;ils utilisent, les pirates sont <\/span><span title=\"become experts in hide &amp; seek. We just lie to ourselves, pretending that if we can't see the attackers then they are not there&quot;.\n\n\">devenus des experts en cache-cache.&nbsp; Nous nous mentons \u00e0 nous-m\u00eames en pr\u00e9tendant que si nous ne pouvons pas voir les attaquants, ils ne sont pas l\u00e0 \u00ab\u00a0.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Bahat took again the WannaCry worm as an example of environment-aware attacks, noting that first the worm had been cautiously isolated in a sandbox by most antiviruses, but then because it featured a time delay and stayed put for some days, it had been released\">Bahat a repris le ver WannaCry comme exemple d&rsquo;attaques sensibles \u00e0 l&rsquo;environnement, notant que le ver avait d&rsquo;abord \u00e9t\u00e9 isol\u00e9 avec pr\u00e9caution dans un bac \u00e0 sable par la plupart des antivirus, mais qu&rsquo;il avait \u00e9t\u00e9 lib\u00e9r\u00e9 apr\u00e8s quelques jours car il restait inactif de part sons syst\u00e8me \u00e0 retardement<\/span><span title=\"again.\">. <\/span><span title=\"As a response to hackers, Bahat proposes innovative defence scenarios, based mostly on re-enforced network isolation and hacker deception.\n\n\">En r\u00e9ponse aux pirates informatiques, Bahat propose des sc\u00e9narios de d\u00e9fense innovants, bas\u00e9s principalement sur l&rsquo;isolation renforc\u00e9e des r\u00e9seaux et la tromperie des pirates informatiques.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;We want to keep malicious stuff as contained and far away as possible, we need to assume that everything is bad. You must shut down all direct access to your assets&quot;, Bahat said, proposing what he calls &quot;content disarmament &amp; reconstruction&quot; as\">\u00ab\u00a0Nous voulons garder les choses malveillantes aussi contenues et aussi loin que possible, nous devons supposer que tout est mauvais.Vous devez fermer tout acc\u00e8s direct \u00e0 vos actifs\u00a0\u00bb, a d\u00e9clar\u00e9 Bahat, en proposant ce qu&rsquo;il appelle \u00a0\u00bb d\u00e9sarmement&nbsp; <\/span><\/span>de <span lang=\"fr\"><span title=\"&quot;We want to keep malicious stuff as contained and far away as possible, we need to assume that everything is bad. You must shut down all direct access to your assets&quot;, Bahat said, proposing what he calls &quot;content disarmament &amp; reconstruction&quot; as\">contenu &amp; reconstruction\u00a0\u00bb comme <\/span><span title=\"one solution.\">solution. <\/span><span title=\"&quot;You take out everything that is important, take it apart and reconstruct it entirely with known safe code&quot;.\n\n\">\u00ab\u00a0Vous enlevez tout ce qui est important, d\u00e9montez-le et reconstruisez-le enti\u00e8rement avec un code dont la s\u00e9curit\u00e9 est connue\u00a0\u00bb.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"For web browsing isolation, Bahat suggests that all the information be processed via the proxy who only sends an interactive HTML5 video stream in real time instead of the real pages.\">Pour l&rsquo;isolation de navigation Web, Bahat sugg\u00e8re que toutes les informations soient trait\u00e9es via le proxy qui envoie seulement un flux vid\u00e9o HTML5 interactif en temps r\u00e9el au lieu des vraies pages. <\/span><span title=\"The users doesn't even know the difference, but that keeps the end-points isolated.\">Les utilisateurs ne connaissent m\u00eame pas la diff\u00e9rence, mais cela garde les points d&rsquo;extr\u00e9mit\u00e9 isol\u00e9s. <\/span><span title=\"Then once the session is over, all the content together with the virtual browser is destroyed.\n\n\">Ensuite, une fois la session termin\u00e9e, tout le contenu ainsi que le navigateur virtuel sont d\u00e9truits.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Deception is the all-time favourite of Bahat.\">La d\u00e9ception est le favori de tous les temps de Bahat. <\/span><span title=\"&quot;First we confuse the attacker, we fake the environment with simulation, it all starts with an endpoint. Since evasive malware uses environment awareness to detect what antiviruses are there, if it has been sandboxed or not, what analysis tools are there, why not\">\u00ab\u00a0D&rsquo;abord nous mettons de la confusion sur l&rsquo;attaquant, nous cr\u00e9ont un faux de l&rsquo;environnement avec la simulation, tout commence par un point de terminaison. Comme les logiciels malveillants \u00e9vasifs utilisent la conscience de l&rsquo;environnement pour d\u00e9tecter quels antivirus sont l\u00e0, s&rsquo;ils sont en sandbox ou pas, quels sont les outils d&rsquo;analyse? pourquoi ne pas <\/span><span title=\"put debuggers, sandboxes, virtual machines on all endpoints? Why not simulate a thousand guard dogs?\n\n\">mettre des d\u00e9bogueurs, des bacs \u00e0 sable, des machines virtuelles sur tous les points d&rsquo;extr\u00e9mit\u00e9? Pourquoi ne pas simuler un millier de chiens de garde?<\/span><\/span><\/p>\n<hr \/>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The idea is that if all the antiviruses look like they are present on the machine, with sandboxes in operation, the malware will choose to do nothing and freeze.\">L&rsquo;id\u00e9e est que si tous les antivirus semblent \u00eatre pr\u00e9sents sur la machine, avec des sandbox en fonctionnement, le malware choisira de ne rien faire et de geler. <\/span><span title=\"&quot;We are not trying to detect the malware, we stop it&quot;, clarifies Bahat.\n\n\">\u00ab\u00a0Nous n&rsquo;essayons pas de d\u00e9tecter le malware, nous l&rsquo;arr\u00eatons\u00a0\u00bb, pr\u00e9cise Bahat.<\/span><\/span><br \/>\n<span id=\"result_box\" lang=\"fr\"><span title=\"&quot;Now the goal of malware is to move to other endpoints, so we want to give hackers a thousand fake servers, so they have no way to know where to go. All of it is simulation, we just make it look like they are real\">\u00ab\u00a0Maintenant, le but du malware est de passer \u00e0 d&rsquo;autres points de terminaison, nous voulons donc donner aux hackers un millier de faux serveurs, donc ils n&rsquo;ont aucun moyen de savoir o\u00f9 aller. C&rsquo;est tout de la simulation, nous donnons juste l&rsquo;impression qu&rsquo;ils sont r\u00e9els <\/span><span title=\", and if they choose one server, they'll trigger an alert. We want to be able to track their moves, setting up believable traps or honey-pots&quot;, Bahat continued.\n\n\">et s&rsquo;ils choisissent un serveur, ils d\u00e9clencheront une alerte. Nous voulons \u00eatre en mesure de suivre leurs mouvements, de mettre en place des pi\u00e8ges cr\u00e9dibles ou des pots de miel \u00bb, a poursuivi M. Bahat.<\/span><\/span><\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;But we need believable decoys. We can deploy fake endpoints, fake PLC machines in an industrial environment or fake files on servers&quot;.\">\u00ab\u00a0Mais nous avons besoin de leurres cr\u00e9dibles: nous pouvons d\u00e9ployer de faux terminaux, de fausses machines PLC dans un environnement industriel ou de faux fichiers sur des serveurs\u00a0\u00bb. <\/span><span title=\"According to Bahat, deception was the biggest trend among last year's innovations.\">Selon Bahat, la d\u00e9ception \u00e9tait la plus grande tendance parmi les innovations de l&rsquo;ann\u00e9e derni\u00e8re. <\/span><span title=\"Next, once the attack has been identified, the malware can be removed.\n\">Ensuite, une fois l&rsquo;attaque identifi\u00e9e, le logiciel malveillant peut \u00eatre supprim\u00e9.<\/span><\/span><\/p>\n<p>\n<span id=\"result_box\" lang=\"fr\"><span title=\"Securitude Cyber Solutions offers its services to international companies, figuring out what their needs are and suggesting the best fitting solutions on the market.\">Securitude Cyber \u200b\u200bSolutions propose ses services aux entreprises internationales, en identifiant leurs besoins et en proposant les solutions les plus adapt\u00e9es. <\/span><span title=\"On its stand, partner Minerva-lab provides the anti-malware evasion platform for endpoints to deceive threats into their dormant state.\">Sur son stand, le partenaire Minerva-lab fournit la plate-forme d&rsquo;\u00e9vasion anti-malware pour les points de terminaison pour tromper les menaces dans leur \u00e9tat dormant. <\/span><span title=\"Other booth partner Cymmetria advertises its decoy-creation platform dubbed MazeRunner, allowing companies to place a plethora of deception elements in the hackers' critical path while creating a realistic environment to detect and quarantine attackers, gathering forensic data as they move innocuously in this fake environment\">Cymmetria, partenaire du stand, annonce sa plate-forme de cr\u00e9ation de leurres baptis\u00e9e MazeRunner, permettant aux entreprises de placer une pl\u00e9thore d&rsquo;\u00e9l\u00e9ments de tromperie dans le chemin critique des hackers tout en cr\u00e9ant un environnement r\u00e9aliste pour d\u00e9tecter et mettre en quarantaine les attaquants. <\/span><span title=\".\n\n\">.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<figure class=\"image\" style=\"float:right\"><img decoding=\"async\" alt=\"\" height=\"213\" data-src=\"http:\/\/www.eenewseurope.com\/sites\/default\/files\/images\/01-picture-library\/eenews\/2018\/n-fic4-minerva.jpg\" width=\"340\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 340px; --smush-placeholder-aspect-ratio: 340\/213;\" \/><figcaption>Minerva-labs&rsquo; hostile environment \u00ab\u00a0freezes\u00a0\u00bb evasive<br \/>\nmalware into inaction.<\/figcaption><\/figure>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"&quot;Since we create dummy endpoints, servers and webservers, all with fake credentials, the only people to use these credentials would be attackers&quot; told us Peter Glock, Managing Director Europe for Cymmetria.\">\u00ab\u00a0Comme&nbsp; nous cr\u00e9ons des points de terminaison, des serveurs et des serveurs Web factices, tous avec de fausses informations d&rsquo;identification, les seules personnes qui vont utiliser ces informations d&rsquo;identification seront des attaquants\u00a0\u00bb, nous a dit Peter Glock, Directeur Europe de Cymmetria. <\/span><span title=\"So it becomes easy for the fake environment to log all of the attacker's moves, tools and tactics within the deception network, giving an insight on the new hacking strategies while containing them.\n\n\">Il devient donc facile pour le faux environnement de consigner tous les mouvements, outils et tactiques de l&rsquo;attaquant dans le r\u00e9seau de d\u00e9ception, donnant un aper\u00e7u des nouvelles strat\u00e9gies de piratage tout en les contenant.<\/span><\/span><br \/>\n&nbsp;<\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"Antivirus companies have already jumped on the deception bandwagon, as Symantec illustrated during a brilliant technical demonstration were pretty much all of these new tricks were in place.\n\n\">Les compagnies antivirus traditionnelles ont d\u00e9j\u00e0 embarqu\u00e9 sur le train de la tromperie, comme Symantec l&rsquo;a illustr\u00e9 lors d&rsquo;une brillante d\u00e9monstration technique o\u00f9 presque toutes ces nouvelles astuces \u00e9taient en place.<\/span><\/span><\/p>\n<p>.<\/p>\n<hr \/>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"The European Union's looming Network and Information Security (NIS) Directive will make it mandatory in 2018 for all operators of essential services (networked utilities providers and public services) as well as digital service providers to implement \u201cstate of the art\u201d cybersecurity technologies to manage\">La prochaine directive de l&rsquo;Union europ\u00e9enne sur la s\u00e9curit\u00e9 des r\u00e9seaux et de l&rsquo;information rendra obligatoire en 2018 pour l&rsquo;ensemble des op\u00e9rateurs de services essentiels (fournisseurs de services publics en r\u00e9seau et services publics) ainsi que les fournisseurs de services num\u00e9riques de mettre en place des technologies de pointe en cybers\u00e9curit\u00e9 pour g\u00e9rer les <\/span><\/span><span lang=\"fr\"><span title=\"the security risks of their networks and systems.\">les risques de s\u00e9curit\u00e9 de leurs r\u00e9seaux et syst\u00e8mes. <\/span><span title=\"This means that security incident response teams will need to be trained and be able to prove it.\">Cela signifie que les \u00e9quipes d&rsquo;intervention en cas d&rsquo;incident de s\u00e9curit\u00e9 devront \u00eatre form\u00e9es et \u00eatre en mesure de le prouver. <\/span><span title=\"This is how CyberTest Systems claims its Cyber Range becomes an essential tool as a crisis management training ground.\n\">C&rsquo;est ainsi que CyberTest Systems affirme que sa gamme Cyber \u200b\u200bdevient un outil essentiel en tant que terrain de formation \u00e0 la gestion de crise.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<figure class=\"image\" style=\"float:left\"><img decoding=\"async\" alt=\"\" height=\"240\" data-src=\"http:\/\/www.eenewseurope.com\/sites\/default\/files\/images\/01-picture-library\/eenews\/2018\/n-fic5-cybertest.jpg\" width=\"320\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 320px; --smush-placeholder-aspect-ratio: 320\/240;\" \/><figcaption>A Cyber Range demonstration from Cyber Test Systems.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span id=\"result_box\" lang=\"fr\"><span title=\"CyberTest Systems' CEO Arnaud Kopp, describes the Cyber Range as an infrastructure deployed to mimic a company's real infrastructure.\">Le PDG de CyberTest Systems, Arnaud Kopp, d\u00e9crit Cyber \u200b\u200bRange comme une infrastructure d\u00e9ploy\u00e9e pour imiter la v\u00e9ritable infrastructure d&rsquo;une entreprise. <\/span><span title=\"Like a test lab, where the security teams can be put to test with cyber-attacks confined to the Cyber Range rather than delivered into the wild and putting other users at risk.\">Comme un laboratoire de test, o\u00f9 les \u00e9quipes de s\u00e9curit\u00e9 peuvent \u00eatre mises \u00e0 l&rsquo;\u00e9preuve avec des cyber-attaques confin\u00e9es \u00e0 la Cyber \u200b\u200bRange plut\u00f4t que livr\u00e9es dans la nature et mettant en danger d&rsquo;autres utilisateurs. <\/span><span title=\"As well as providing safe grounds for training, the company can invite other parties such as Yes We Hack to contribute with multiple attack scenarios.\">En plus de fournir des terrains s\u00fbrs pour la formation, l&rsquo;entreprise peut inviter d&rsquo;autres parties telles que Yes We Hack \u00e0 contribuer avec de multiples sc\u00e9narios d&rsquo;attaque. <\/span><span title=\"A basic Cyber Range costs around 100,000 Euros revealed the CEO, adding that cost increased with the complexity of the infrastructure to replicate.\">Une Cyber \u200b\u200bRange de base co\u00fbte environ 100.000 Euros, a r\u00e9v\u00e9l\u00e9 le PDG, ajoutant que le co\u00fbt augmentait avec la complexit\u00e9 de l&rsquo;infrastructure \u00e0 r\u00e9pliquer.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>Forum International de la Cybers\u00e9curit\u00e9 &#8211; <a href=\"http:\/\/www.forum-fic.com\">www.forum-fic.com<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>La r\u00e9daction vous conseille aussi:<\/strong><\/p>\n<p><a href=\"http:\/\/Quand l'IA s'aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9\"><strong>Quand l&rsquo;IA s&rsquo;aventure dans le labyrinthe de la cyber-s\u00e9curit\u00e9<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/node\/101403\">Meltdown et Spectre, les processeurs Intel pas seuls en cause<\/a><\/p>\n<p><a href=\"http:\/\/www.electronique-eci.com\/news\/intel-lantidote-pour-meltdown-et-spectre\">Intel a l&rsquo;antidote pour Meltdown et Spectre<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Related articles in English:<\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/intel-produces-white-paper-benchmark-meltdown-spectre\">Intel produces white paper, benchmark on Meltdown, Spectre<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/liverpool-cyber-attack-sparks-debate\">Liverpool cyber-attack sparks debate<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/research-claims-cyber-attack-vulnerability-rise-after-uk-quits-eu-0\">Research claims cyber-attack vulnerability to rise after UK quits EU<\/a><\/p>\n<p><a href=\"http:\/\/www.eenewseurope.com\/news\/uk-issues-security-guidelines-driverless-car-designers\">UK issues security guidelines for driverless car designers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0La d\u00e9tection est morte!\u00a0\u00bb s&rsquo;est exclam\u00e9 dans l&rsquo;une des master-classes du FIC ( \u00e0 Lille), Yul Bahat, co-fondateur du cabinet de conseil en cybers\u00e9curit\u00e9 Securitude Cyber Solutions. \u00ab\u00a0Les antivirus ne sont plus une r\u00e9ponse ad\u00e9quate\u00a0\u00bb, a d\u00e9clar\u00e9 Bahat, observant que les attaques ne sont plus frontales mais diffuses et \u00e9vasives et que le m\u00e9canisme de protection de base offert par les antivirus a \u00e9chou\u00e9, trafiqu\u00e9 par des signatures inconnues, des comportements inconnus, des retards et ainsi de suite. Les derniers exemples connus \u00e9tant les vers WannaCry et Petya l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n","protected":false},"author":22,"featured_media":130711,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[883],"tags":[893,917],"domains":[47],"ppma_author":[1149],"class_list":["post-130710","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technologies","tag-authentication-encryption-fr","tag-software-embedded-tools-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>L&#039;antivirus qui trompe les pirates ...<\/title>\n<meta name=\"description\" content=\"&quot;La d\u00e9tection est morte!&quot; s&#039;est exclam\u00e9 dans l&#039;une des master-classes du FIC ( \u00e0 Lille), Yul Bahat, co-fondateur du cabinet de conseil en cybers\u00e9curit\u00e9...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;antivirus qui trompe les pirates\" \/>\n<meta property=\"og:description\" content=\"&quot;La d\u00e9tection est morte!&quot; s&#039;est exclam\u00e9 dans l&#039;une des master-classes du FIC ( \u00e0 Lille), Yul Bahat, co-fondateur du cabinet de conseil en cybers\u00e9curit\u00e9 Securitude Cyber Solutions. &quot;Les antivirus ne sont plus une r\u00e9ponse ad\u00e9quate&quot;, a d\u00e9clar\u00e9 Bahat, observant que les attaques ne sont plus frontales mais diffuses et \u00e9vasives et que le m\u00e9canisme de protection de base offert par les antivirus a \u00e9chou\u00e9, trafiqu\u00e9 par des signatures inconnues, des comportements inconnus, des retards et ainsi de suite. Les derniers exemples connus \u00e9tant les vers WannaCry et Petya l&#039;ann\u00e9e derni\u00e8re.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-08T11:06:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-fic6-securitude.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1247\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eeNews Europe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eeNews Europe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/\"},\"author\":{\"name\":\"eeNews Europe\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\"},\"headline\":\"L&rsquo;antivirus qui trompe les pirates\",\"datePublished\":\"2018-02-08T11:06:46+00:00\",\"dateModified\":\"2018-02-08T11:06:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/\"},\"wordCount\":1243,\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\",\"Software &amp; Embedded tools\"],\"articleSection\":[\"Technologies\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/\",\"url\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/\",\"name\":\"L'antivirus qui trompe les pirates -\",\"isPartOf\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\"},\"datePublished\":\"2018-02-08T11:06:46+00:00\",\"dateModified\":\"2018-02-08T11:06:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&rsquo;antivirus qui trompe les pirates\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#website\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.eenewseurope.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4\",\"name\":\"eeNews Europe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g\",\"caption\":\"eeNews Europe\"}}]}<\/script>","yoast_head_json":{"title":"L'antivirus qui trompe les pirates ...","description":"\"La d\u00e9tection est morte!\" s'est exclam\u00e9 dans l'une des master-classes du FIC ( \u00e0 Lille), Yul Bahat, co-fondateur du cabinet de conseil en cybers\u00e9curit\u00e9...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710\/","og_locale":"fr_FR","og_type":"article","og_title":"L'antivirus qui trompe les pirates","og_description":"\"La d\u00e9tection est morte!\" s'est exclam\u00e9 dans l'une des master-classes du FIC ( \u00e0 Lille), Yul Bahat, co-fondateur du cabinet de conseil en cybers\u00e9curit\u00e9 Securitude Cyber Solutions. \"Les antivirus ne sont plus une r\u00e9ponse ad\u00e9quate\", a d\u00e9clar\u00e9 Bahat, observant que les attaques ne sont plus frontales mais diffuses et \u00e9vasives et que le m\u00e9canisme de protection de base offert par les antivirus a \u00e9chou\u00e9, trafiqu\u00e9 par des signatures inconnues, des comportements inconnus, des retards et ainsi de suite. Les derniers exemples connus \u00e9tant les vers WannaCry et Petya l'ann\u00e9e derni\u00e8re.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710\/","og_site_name":"EENewsEurope","article_published_time":"2018-02-08T11:06:46+00:00","og_image":[{"width":1247,"height":960,"url":"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/n-fic6-securitude.jpg","type":"image\/jpeg"}],"author":"eeNews Europe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eeNews Europe","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#article","isPartOf":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/"},"author":{"name":"eeNews Europe","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4"},"headline":"L&rsquo;antivirus qui trompe les pirates","datePublished":"2018-02-08T11:06:46+00:00","dateModified":"2018-02-08T11:06:46+00:00","mainEntityOfPage":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/"},"wordCount":1243,"publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"keywords":["Authentication &amp; Encryption","Software &amp; Embedded tools"],"articleSection":["Technologies"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/","url":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/","name":"L'antivirus qui trompe les pirates -","isPartOf":{"@id":"https:\/\/www.eenewseurope.com\/en\/#website"},"datePublished":"2018-02-08T11:06:46+00:00","dateModified":"2018-02-08T11:06:46+00:00","breadcrumb":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cdn.eenewseurope.com\/fr\/lantivirus-qui-trompe-les-pirates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"L&rsquo;antivirus qui trompe les pirates"}]},{"@type":"WebSite","@id":"https:\/\/www.eenewseurope.com\/en\/#website","url":"https:\/\/www.eenewseurope.com\/en\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.eenewseurope.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eenewseurope.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.eenewseurope.com\/en\/#organization","name":"EENewsEurope","url":"https:\/\/www.eenewseurope.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/9eff4051fa9dac8230052de45e32b0f4","name":"eeNews Europe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.eenewseurope.com\/en\/#\/schema\/person\/image\/fae8f0cb15861c4ae0ed4872e2c9fc22","url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","caption":"eeNews Europe"}}]}},"authors":[{"term_id":1149,"user_id":22,"is_guest":0,"slug":"eenews-europe","display_name":"eeNews Europe","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/5081509054e28b04ecd976976e723ce0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=130710"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/130710\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/130711"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=130710"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=130710"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=130710"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=130710"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=130710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}