{"id":2861,"date":"2013-03-21T08:00:00","date_gmt":"2013-03-21T08:00:00","guid":{"rendered":"http:\/\/fr.le-vpn.net\/bientot-un-sommet-sur-la-cyber-securite-entre-les-etats-unis-et-la-chine\/"},"modified":"2016-10-06T14:32:57","modified_gmt":"2016-10-06T12:32:57","slug":"cyber-securite","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/cyber-securite\/","title":{"rendered":"Bient\u00f4t un sommet sur la cyber-s\u00e9curit\u00e9 entre les Etats-Unis et la Chine ?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div dir=\"ltr\">\n<div><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/3.bp.blogspot.com\/-5IlP-1sveQg\/UUd4XXkFuqI\/AAAAAAAAASc\/uS66vMrfG5w\/s320\/71625_u-s-under-secretary-of-defense-for-policy-flournoy-meets-with-china-deputy-chief-of-general-staff-of-the-pla-ma-in-beijing.jpg\" alt=\"cyber-s\u00e9curit\u00e9 \" width=\"320\" height=\"204\" border=\"0\" \/><\/div>\n<p>Depuis plusieurs ann\u00e9es, les Etats-Unis et la Chine sont int\u00e9ress\u00e9 par la cyber-s\u00e9curit\u00e9 et ils s&#8217;accusent de mener des cyber-attaques visant des entreprises informatiques priv\u00e9es mais \u00e9galement publiques. Tom Donilon, le conseiller de s\u00e9curit\u00e9 nationale de Barack Obama vient d\u2019expliquer que P\u00e9kin devait prendre \u00ab des mesures s\u00e9rieuses pour enqu\u00eater sur ces activit\u00e9s et y mettre fin \u00bb<\/p>\n<p>A la Maison Blanche, on parle m\u00eame de &#8220;vols cibl\u00e9s et sophistiqu\u00e9s de secrets industriels \u00e0 tr\u00e8s grande \u00e9chelle via des intrusions informatiques en provenance de Chine&#8221;.<\/p>\n<p>Hors, la Chine qui jouait pendant longtemps la d\u00e9fense et se contentait de clamer son innocence passe d\u00e9sormais \u00e0 un mode communication offensif : elle accuse les Etats-Unis d&#8217;\u00eatre \u00e0 l&#8217;origine de dizaines de milliers d&#8217;attaques contre le site chinois du minist\u00e8re de la D\u00e9fense.<\/p>\n<p>Selon la presse officielle, les Am\u00e9ricains seraient \u00e0 l&#8217;origine de plus de la moiti\u00e9 des cyberattaques visant la Chine. Quand il s\u2019agit de cyber-s\u00e9curit\u00e9 sur internet, les victimes sont souvent aussi les instigateurs, il n\u2019y a pas les bons et les m\u00e9chants \u00e9l\u00e8ves, il y a des experts du cyberespionnage et du cybercrime des deux bords. Les Etats-Unis sont ainsi soup\u00e7onn\u00e9s d\u2019\u00eatre \u00e0 l\u2019origine de Stuxnet, un virus ultra sophistiqu\u00e9 qui s&#8217;est attaqu\u00e9 aux centrales nucl\u00e9aires iraniennes. Comme l\u2019\u00e9voque un expert du sujet, tout le monde espionne tout le monde !<\/p>\n<p>La Chine souhaite d\u00e9sormais discuter du sujet de la cyber-s\u00e9curit\u00e9 avec les Etats-Unis, tel qu\u2019a annonc\u00e9 le 15 mars la porte-parole du minist\u00e8re chinois des Affaires \u00e9trang\u00e8res Hua Chunying, lors d&#8217;une conf\u00e9rence de presse. &#8220;La Chine s&#8217;oppose r\u00e9solument \u00e0 toute forme de piratage informatique et est pr\u00eate \u00e0 communiquer, de mani\u00e8re constructive, avec les Etats-Unis au sujet de la s\u00e9curit\u00e9 du cyberespace&#8221;, a indiqu\u00e9 Mme Hua, peu de temps apr\u00e8s que le pr\u00e9sident chinois Xi Jinping et le pr\u00e9sident am\u00e9ricain Barack Obama se soient entretenus par t\u00e9l\u00e9phone.<\/p>\n<p>Pour que votre navigation Internet reste \u00e0 l\u2019abri des regards indiscrets, optez pour un <a href=\"http:\/\/www.le-vpn.com\/fr\/\">VPN<\/a>. Vous vous assurez ainsi que votre activit\u00e9 en ligne se d\u00e9roule <a href=\"http:\/\/www.le-vpn.com\/fr\/surfez-anonymement\">anonymement<\/a>, en toute s\u00e9curit\u00e9.<\/p>\n<p>Il vous suffit de s\u00e9lectionner un serveur VPN dans l&#8217;un des 50\u00a0<a href=\"http:\/\/www.le-vpn.com\/fr\/adresses-ip-des-differents-pays\">pays<\/a> propos\u00e9s pour prot\u00e9ger toutes vos activit\u00e9s sur Internet, gr\u00e2ce \u00e0 un tunnel VPN s\u00e9curis\u00e9 virtuel incluant un cryptage extr\u00eamement fort, de type militaire. Votre adresse IP sera automatiquement remplac\u00e9e par une adresse IP anonyme du pays que vous avez s\u00e9lectionn\u00e9. Vous pourrez surfer librement sur Internet, sans \u00eatre inqui\u00e9t\u00e9 par les curieux.<\/p>\n<\/div>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-6369d2436235e70\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-969d24362344ef\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-3969d24362345cc\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-4869d2436234582\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-3469d2436234f9d\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-8469d24362352cf\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-9969d2436235588\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-6969d243623588d\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-7269d2436236621\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>Depuis plusieurs ann\u00e9es, les Etats-Unis et la Chine sont int\u00e9ress\u00e9 par la cyber-s\u00e9curit\u00e9 et ils s&#8217;accusent de mener des cyber-attaques visant des entreprises informatiques priv\u00e9es mais \u00e9galement publiques. Tom Donilon, le conseiller de s\u00e9curit\u00e9 nationale de Barack Obama vient d\u2019expliquer que P\u00e9kin devait prendre \u00ab des mesures s\u00e9rieuses pour enqu\u00eater sur ces activit\u00e9s et y<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"Depuis plusieurs ann\u00e9es, les Etats-Unis et la Chine sont int\u00e9ress\u00e9 par la cyber-s\u00e9curit\u00e9 et s'accusent de mener des cyber-attaque","footnotes":""},"categories":[833],"tags":[268,35,269,248],"yst_prominent_words":[],"class_list":["post-2861","post","type-post","status-publish","format-standard","hentry","category-blog_old","tag-chine","tag-cybercrime-2","tag-cyberespionnage","tag-cybersecurite"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=2861"}],"version-history":[{"count":4,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2861\/revisions"}],"predecessor-version":[{"id":9639,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/2861\/revisions\/9639"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=2861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=2861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=2861"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=2861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}