{"id":23961,"date":"2021-02-02T13:41:46","date_gmt":"2021-02-02T12:41:46","guid":{"rendered":"https:\/\/piekblog.com\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/"},"modified":"2021-02-02T13:41:46","modified_gmt":"2021-02-02T12:41:46","slug":"cyberattaques-attaque-indirecte-sur-la-croissance-economique","status":"publish","type":"post","link":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/","title":{"rendered":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ?"},"content":{"rendered":"<p>L\u2019\u00e8re de Bonnie et Clyde, lorsque les banques se faisaient braquer par des personnes arm\u00e9es, est r\u00e9volue depuis un petit temps d\u00e9j\u00e0. Tout cela n\u2019est plus n\u00e9cessaire aujourd\u2019hui, car les criminels modernes s\u2019arment d\u2019un ordinateur portable et des comp\u00e9tences techniques n\u00e9cessaires pour contourner les pare-feu et autres protections. Cela peut sembler simpliste, mais les faits r\u00e9v\u00e8lent que depuis que les institutions financi\u00e8res, comme les banques, d\u00e9pendent de plus en plus des syst\u00e8mes informatiques et d\u2019Internet, le nombre d\u2019attaques cybern\u00e9tiques a consid\u00e9rablement augment\u00e9. En 2018, une banque sur quatre \u00e0 travers le monde a signal\u00e9 avoir \u00e9t\u00e9 attaqu\u00e9e par des pirates. Il s\u2019agit l\u00e0 d\u2019une augmentation de 160 % par rapport \u00e0 l\u2019ann\u00e9e pr\u00e9c\u00e9dente. Par ailleurs, les banques ne sont pas les seules victimes, leurs partenaires commerciaux peuvent eux-aussi souffrir des cons\u00e9quences de ces attaques.<\/p>\n<p>Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars. L\u2019attaque a \u00e9t\u00e9 d\u00e9tect\u00e9e gr\u00e2ce \u00e0 une faute d\u2019orthographe qui s\u2019\u00e9tait gliss\u00e9e dans un ordre de virement, mais plus de 80 millions de dollars s\u2019\u00e9taient alors d\u00e9j\u00e0 envol\u00e9s. L\u2019attaque est attribu\u00e9e \u00e0 un groupe de pirates install\u00e9 en Cor\u00e9e du Nord et qui dispose du soutien du gouvernement pour d\u00e9stabiliser l\u2019\u00e9conomie mondiale. Ce groupe, qui se fait appeler Lazare et qui est soutenu par le r\u00e9gime nord-cor\u00e9en, a d\u00e9j\u00e0 men\u00e9 diverses cyberattaques sur des institutions financi\u00e8res. La banque du Mexique et la banque du Chili font notamment partie de ses victimes.<\/p>\n<p>Les cybercriminels n\u2019ont par ailleurs aucun mal \u00e0 pirater les distributeurs automatiques de billets. En installant un logiciel malveillant, un groupe de hackers a r\u00e9ussi \u00e0 voler les donn\u00e9es d\u2019identification bancaire des clients et \u00e0 ainsi d\u00e9rober pr\u00e8s de 12 millions de dollars en moins d\u2019une demi-journ\u00e9e. De plus, les pirates sont d\u00e9sormais tellement ing\u00e9nieux qu\u2019il leur suffit de brancher leur ordinateur portable \u00e0 un distributeur de billets pour retirer tout l\u2019argent disponible, ce qui s\u2019est d\u00e9j\u00e0 produit entre autres au Kenya.<\/p>\n<p>Le pouvoir l\u00e9gislatif n\u2019est pas encore en mesure de r\u00e9agir de mani\u00e8re proactive \u00e0 ce type de cybercriminalit\u00e9. La situation est identique dans le monde entier. Les lois relatives \u00e0 la cybercriminalit\u00e9 ont toujours une longueur de retard sur les cas concrets, ce qui permet aux pirates de conserver l\u2019avantage, m\u00eame lorsqu\u2019ils ne sont pas soutenus par leur gouvernement. \u00c0 court terme, la solution consiste organiser une coop\u00e9ration \u00e9troite entre les diff\u00e9rentes institutions financi\u00e8res. Ces derni\u00e8res devront mettre en place des protocoles intelligents et des accords professionnels tr\u00e8s rigides afin d\u2019emp\u00eacher aux hackers de pirater le syst\u00e8me. Cependant, nous sommes encore tr\u00e8s loin d\u2019une telle collaboration. Pourtant, dans l\u2019int\u00e9r\u00eat \u00e9conomique d\u2019un pays, il est capital que les autorit\u00e9s et les banques abordent la cybercriminalit\u00e9 de mani\u00e8re professionnelle afin de pr\u00e9venir toute d\u00e9stabilisation de l\u2019\u00e9conomie.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019\u00e8re de Bonnie et Clyde, lorsque les banques se faisaient  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":23956,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275],"tags":[341],"class_list":["post-23961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-piek-fr","tag-cybercrime-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK<\/title>\n<meta name=\"description\" content=\"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK\" \/>\n<meta property=\"og:description\" content=\"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-02T12:41:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"557\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wendy Wings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wendy Wings\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/\"},\"author\":{\"name\":\"Wendy Wings\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\"},\"headline\":\"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ?\",\"datePublished\":\"2021-02-02T12:41:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/\",\"name\":\"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"datePublished\":\"2021-02-02T12:41:46+00:00\",\"description\":\"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"width\":860,\"height\":557,\"caption\":\"Man wearing hoodie hacking server in dark room\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PiekIEC\",\"https:\\\/\\\/x.com\\\/PiekIEC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/piek-international-education-centre-bv\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\",\"name\":\"Wendy Wings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"caption\":\"Wendy Wings\"},\"url\":\"https:\\\/\\\/piekblog.com\\\/fr\\\/author\\\/wendy-wings\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK","description":"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/","og_locale":"fr_FR","og_type":"article","og_title":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK","og_description":"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.","og_url":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2021-02-02T12:41:46+00:00","og_image":[{"width":860,"height":557,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","type":"image\/jpeg"}],"author":"Wendy Wings","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"\u00c9crit par":"Wendy Wings","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/"},"author":{"name":"Wendy Wings","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e"},"headline":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ?","datePublished":"2021-02-02T12:41:46+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/"},"wordCount":548,"publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","keywords":["Cybercrime"],"articleSection":["PIEK"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/","url":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/","name":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ? - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","datePublished":"2021-02-02T12:41:46+00:00","description":"Les hackers qui ont lanc\u00e9 des attaques de grande ampleur sur la banque centrale du Bangladesh, par exemple, ont tent\u00e9 de d\u00e9rober pr\u00e8s de 100 millions de dollars.","breadcrumb":{"@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","width":860,"height":557,"caption":"Man wearing hoodie hacking server in dark room"},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/fr\/cyberattaques-attaque-indirecte-sur-la-croissance-economique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cyberattaques : attaque indirecte sur la croissance \u00e9conomique ?"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/fr\/#website","url":"https:\/\/piekblog.com\/fr\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/fr\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e","name":"Wendy Wings","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","caption":"Wendy Wings"},"url":"https:\/\/piekblog.com\/fr\/author\/wendy-wings\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/23961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/comments?post=23961"}],"version-history":[{"count":0,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/23961\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media\/23956"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media?parent=23961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/categories?post=23961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/tags?post=23961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}