{"version":"1.0","provider_name":"CYBERDEFENSE@DATATECH","provider_url":"https:\/\/cyberdef.org","author_name":"CDDT","author_url":"https:\/\/cyberdef.org\/index.php\/author\/cddt\/","title":"CONSEILS ET INFORMATIONS - CYBERDEFENSE@DATATECH","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"o4g5jAp97j\"><a href=\"https:\/\/cyberdef.org\/index.php\/conseils-et-informations\/\">CONSEILS ET INFORMATIONS<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cyberdef.org\/index.php\/conseils-et-informations\/embed\/#?secret=o4g5jAp97j\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0CONSEILS ET INFORMATIONS\u00a0\u00bb &#8212; CYBERDEFENSE@DATATECH\" data-secret=\"o4g5jAp97j\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";var e=!1,o=!1;if(l.querySelector)if(d.addEventListener)e=!0;if(d.wp=d.wp||{},!d.wp.receiveEmbedMessage)if(d.wp.receiveEmbedMessage=function(e){var t=e.data;if(t)if(t.secret||t.message||t.value)if(!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var r,a,i,s=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),c=0;c<n.length;c++)n[c].style.display=\"none\";for(c=0;c<s.length;c++)if(r=s[c],e.source===r.contentWindow){if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(i=parseInt(t.value,10)))i=1e3;else if(~~i<200)i=200;r.height=i}if(\"link\"===t.message)if(a=l.createElement(\"a\"),i=l.createElement(\"a\"),a.href=r.getAttribute(\"src\"),i.href=t.value,o.test(i.protocol))if(i.host===a.host)if(l.activeElement===r)d.top.location.href=t.value}}},e)d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),d.addEventListener(\"load\",t,!1);function t(){if(!o){o=!0;for(var e,t,r,a=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),i=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),s=l.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<s.length;n++){if(!(r=(t=s[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(a||i)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"Alors qu&rsquo;Internet fait de plus en plus partie int\u00e9grante de notre vie quotidienne, les probl\u00e8mes relatifs \u00e0 la confidentialit\u00e9 et \u00e0 la s\u00e9curit\u00e9 sur Internet sont au c\u0153ur des discussions. Pr\u00e9server la s\u00e9curit\u00e9 de vos donn\u00e9es personnelles, priv\u00e9es et financi\u00e8res n&rsquo;est pas toujours \u00e9vident, mais en suivant quelques conseils de cyberdefense@datatech , vous pourrez \u00e9viter&hellip; Lire la suite"}