{"id":24057,"date":"2021-04-13T14:02:16","date_gmt":"2021-04-13T12:02:16","guid":{"rendered":"https:\/\/piekblog.com\/cybercriminalite-et-prevention-des-termes-contradictoires\/"},"modified":"2021-04-13T14:02:16","modified_gmt":"2021-04-13T12:02:16","slug":"cybercriminalite-et-prevention-des-termes-contradictoires","status":"publish","type":"post","link":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/","title":{"rendered":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires?"},"content":{"rendered":"<p>Avant d\u2019aller plus loin au sujet de la pr\u00e9vention de la cybercriminalit\u00e9, nous souhaitons d\u00e9finir quelques concepts. On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement ?<\/p>\n<p>Les pirates ou groupes de pirates ont d\u00e9velopp\u00e9 des malwares, des logiciels malveillants, afin d\u2019organiser et d\u2019ex\u00e9cuter leurs activit\u00e9s criminelles. Ces logiciels peuvent accomplir l\u2019une des activit\u00e9s suivantes :<\/p>\n<ul>\n<li>Vol de codes afin d\u2019acc\u00e9der aux comptes bancaires de la victime.<\/li>\n<li>Affichage de publicit\u00e9s sur l\u2019ordinateur de la victime.<\/li>\n<li>Usage ill\u00e9gal des capacit\u00e9s de l\u2019ordinateur de la victime afin, par exemple, de lancer des campagnes de spam, d\u2019attaquer d\u2019autres r\u00e9seaux (attaque par d\u00e9ni de service) ou de faire chanter d\u2019autres personnes.<\/li>\n<\/ul>\n<p>Il existe une solution \u00e9vidente : les programmes anti-malware. Ces programmes sont capables de d\u00e9tecter et de supprimer les logiciels nuisibles. Les versions plus co\u00fbteuses permettent m\u00eame de prot\u00e9ger tout le contenu stock\u00e9 dans le cloud et sur les autres supports de donn\u00e9es, comme les t\u00e9l\u00e9phones portables, les tablettes, etc. En effectuant des recherches sur ces programmes haut de gamme, on constate toutefois qu\u2019ils sont incapables d\u2019assurer une protection absolue. Cette lacune est due \u00e0 l\u2019\u00e9volution ultra-rapide de l\u2019environnement. En effet, ces programmes sont d\u00e9j\u00e0 d\u00e9pass\u00e9s lorsqu\u2019ils sont commercialis\u00e9s car les cybercriminels restent toujours actifs. D\u00e8s qu\u2019ils savent qu\u2019un certain logiciel malveillant ne fonctionne plus, ils d\u00e9veloppent une autre version. Les programmes anti-malware contribuent n\u00e9anmoins \u00e0 la pr\u00e9vention des attaques.<\/p>\n<p>D\u2019exp\u00e9rience, nous savons que le simple fait d\u2019acheter un programme anti-malware ou antivirus ne suffit pas. La mise \u00e0 jour r\u00e9guli\u00e8re du logiciel install\u00e9 est elle aussi capitale pour prot\u00e9ger notre syst\u00e8me.<\/p>\n<p>Si la protection du syst\u00e8me est importante, la sensibilisation r\u00e9guli\u00e8re des employ\u00e9s l\u2019est tout autant. Il y a quelques semaines, un \u00e9tablissement d\u2019enseignement sup\u00e9rieur n\u00e9erlandais a volontairement envoy\u00e9 un e-mail d\u2019hame\u00e7onnage \u00e0 tous ses employ\u00e9s et \u00e9l\u00e8ves. Le r\u00e9sultat de l\u2019exp\u00e9rience \u00e9tait pr\u00e9occupant. Pr\u00e8s de 30 pour cent des destinataires (plus de 5 000 personnes) ont ouvert cet e-mail alors que durant les semaines pr\u00e9c\u00e9dentes, plusieurs avertissements avaient \u00e9t\u00e9 publi\u00e9s via divers canaux au sujet de ce type d\u2019e-mail. Heureusement, la majorit\u00e9 des destinataires n\u2019ont pas ouvert le courrier et l\u2019ont transf\u00e9r\u00e9 au service concern\u00e9, qui a cependant \u00e9t\u00e9 surcharg\u00e9.<\/p>\n<p>Conclusion : les gens sont ici le facteur d\u00e9cisif. Ils travaillent \u00e0 l\u2019ordinateur, ouvrent des messages WhatsApp, effectuent des transactions bancaires en ligne et consultent tous les m\u00e9dias sous forme num\u00e9rique. Il est n\u00e9cessaire d\u2019informer les utilisateurs que la pr\u00e9vention commence tout d\u2019abord chez eux. Il faut r\u00e9guli\u00e8rement leur rappeler les faits, c\u2019est comme \u00e7a qu\u2019on pourra commencer \u00e0 prot\u00e9ger nos syst\u00e8mes contre la cybercriminalit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avant d\u2019aller plus loin au sujet de la pr\u00e9vention de  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":23956,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[275],"tags":[341],"class_list":["post-24057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-piek-fr","tag-cybercrime-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK<\/title>\n<meta name=\"description\" content=\"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK\" \/>\n<meta property=\"og:description\" content=\"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T12:02:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"557\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wendy Wings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wendy Wings\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\"},\"author\":{\"name\":\"Wendy Wings\",\"@id\":\"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e\"},\"headline\":\"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires?\",\"datePublished\":\"2021-04-13T12:02:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\"},\"wordCount\":536,\"publisher\":{\"@id\":\"https:\/\/piekblog.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\",\"url\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\",\"name\":\"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK\",\"isPartOf\":{\"@id\":\"https:\/\/piekblog.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\",\"datePublished\":\"2021-04-13T12:02:16+00:00\",\"description\":\"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?\",\"breadcrumb\":{\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage\",\"url\":\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\",\"contentUrl\":\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\",\"width\":860,\"height\":557,\"caption\":\"Man wearing hoodie hacking server in dark room\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/piekblog.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/piekblog.com\/fr\/#website\",\"url\":\"https:\/\/piekblog.com\/fr\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\/\/piekblog.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/piekblog.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/piekblog.com\/fr\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\/\/piekblog.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PiekIEC\",\"https:\/\/x.com\/PiekIEC\",\"https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv\",\"https:\/\/www.youtube.com\/c\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e\",\"name\":\"Wendy Wings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"caption\":\"Wendy Wings\"},\"url\":\"https:\/\/piekblog.com\/fr\/author\/wendy-wings\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK","description":"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK","og_description":"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?","og_url":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2021-04-13T12:02:16+00:00","og_image":[{"width":860,"height":557,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","type":"image\/jpeg"}],"author":"Wendy Wings","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"\u00c9crit par":"Wendy Wings","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/"},"author":{"name":"Wendy Wings","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e"},"headline":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires?","datePublished":"2021-04-13T12:02:16+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/"},"wordCount":536,"publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","keywords":["Cybercrime"],"articleSection":["PIEK"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/","url":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/","name":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires? - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","datePublished":"2021-04-13T12:02:16+00:00","description":"On entend souvent parler, m\u00eame en cette p\u00e9riode de crise face au coronavirus, d\u2019attaques cyber, de failles de s\u00e9curit\u00e9, de vol de donn\u00e9es, etc., mais qu\u2019est-ce tous ces termes signifient r\u00e9ellement?","breadcrumb":{"@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","width":860,"height":557,"caption":"Man wearing hoodie hacking server in dark room"},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/fr\/cybercriminalite-et-prevention-des-termes-contradictoires\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Cybercriminalit\u00e9 et pr\u00e9vention : des termes contradictoires?"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/fr\/#website","url":"https:\/\/piekblog.com\/fr\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/fr\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/fr\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e","name":"Wendy Wings","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","caption":"Wendy Wings"},"url":"https:\/\/piekblog.com\/fr\/author\/wendy-wings\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/24057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/comments?post=24057"}],"version-history":[{"count":0,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/posts\/24057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media\/23956"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/media?parent=24057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/categories?post=24057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/fr\/wp-json\/wp\/v2\/tags?post=24057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}