{"id":5468,"date":"2014-11-12T09:00:23","date_gmt":"2014-11-12T09:00:23","guid":{"rendered":"https:\/\/www.le-vpn.com\/fr\/?p=5468"},"modified":"2015-07-05T15:27:19","modified_gmt":"2015-07-05T15:27:19","slug":"virus-iphone-menace-les-clients-dapple","status":"publish","type":"post","link":"https:\/\/www.le-vpn.com\/fr\/virus-iphone-menace-les-clients-dapple\/","title":{"rendered":"Un virus sur iPhone menace les clients d&#8217;Apple"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>Des chercheurs en s\u00e9curit\u00e9 informatique viennent de d\u00e9couvrir un nouveau type de virus capable d&#8217;infecter l&#8217;iPhone d&#8217;Apple, depuis un ordinateur Mac. Cela repr\u00e9sente une menace pour des centaines de milliers d\u2019appareils qui jusqu\u2019\u00e0 aujourd\u2019hui \u00e9taient consid\u00e9r\u00e9s comme r\u00e9sistants aux cybercriminels.<\/p>\n<p>Selon les chercheurs de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 informatique Palo Alto Networks, le virus, nomm\u00e9 WireLurker, montre &#8220;<em>des caract\u00e9ristiques jamais vues dans les menaces rep\u00e9r\u00e9es pr\u00e9c\u00e9demment et visant des plateformes Apple<\/em>&#8220;.<\/p>\n<p>Dans la pratique, le virus infecte d&#8217;abord un ordinateur Mac, fonctionnant avec le syst\u00e8me d&#8217;exploitation OS X. Il s&#8217;installe ensuite sur les tablettes iPad et les t\u00e9l\u00e9phones iPhone (utilisant un syst\u00e8me d&#8217;exploitation diff\u00e9rent, iOS) lorsqu\u2019ils sont connect\u00e9s \u00e0 cet ordinateur avec une prise USB.<\/p>\n<p>Le virus semblerait fonctionner m\u00eame sur des appareils iPhone n\u2019ayant pas \u00e9t\u00e9 d\u00e9bloqu\u00e9s pour pouvoir y installer des logiciels non autoris\u00e9s, ce qui semblait jusque-l\u00e0 la principale cible des pirates informatiques.<\/p>\n<p>Le virus &#8220;<em>est capable de voler une s\u00e9rie d&#8217;informations dans les appareils mobiles qu&#8217;il infecte, et demande r\u00e9guli\u00e8rement des mises \u00e0 jour \u00e0 partir du serveur des attaquants<\/em>&#8220;, d\u2019apr\u00e8s le rapport des chercheurs, qui jugent que &#8220;<em>l&#8217;objectif ultime de ses cr\u00e9ateurs n&#8217;est pas clair<\/em>&#8220;.<\/p>\n<p>Cela repr\u00e9sente &#8220;<em>une menace potentielle pour les entreprises, les gouvernements, et les clients d&#8217;Apple dans le monde<\/em>&#8220;, avec des centaines de milliers d&#8217;appareils potentiellement infect\u00e9s, pr\u00e9viennent-ils.<\/p>\n<p>Ces m\u00eames chercheurs ont remont\u00e9 jusqu&#8217;\u00e0 une boutique en ligne chinoise d&#8217;applications mobiles qui contenait 467 applications infect\u00e9es ayant \u00e9t\u00e9 t\u00e9l\u00e9charg\u00e9es plus de 356\u00a0104 fois.<\/p>\n<p>Apple a indiqu\u00e9 avoir &#8220;<em>bloqu\u00e9 les applications identifi\u00e9es pour les emp\u00eacher de d\u00e9marrer<\/em>&#8220;.<\/p>\n<p>Jonathan Zdziarski, un autre sp\u00e9cialiste en s\u00e9curit\u00e9 informatique indique que le nouveau virus pourrait d\u00e9boucher sur un probl\u00e8me de s\u00e9curit\u00e9 plus global pour les appareils d&#8217;Apple. &#8220;<em>Le vrai probl\u00e8me, c&#8217;est que la conception du m\u00e9canisme de connexion d&#8217;iOS permet des variantes plus sophistiqu\u00e9es<\/em>&#8220;, indique-t-il sur son blog.<\/p>\n<p>Veillez donc toujours \u00e0 t\u00e9l\u00e9charger et installer des logiciels provenant de sources s\u00fbres.<\/p>\n<p>Aujourd\u2019hui, la solution la plus s\u00fbre pour prot\u00e9ger des hackers votre ordinateur, votre t\u00e9l\u00e9phone mobile ou votre tablette lors de vos connexions internet est d\u2019utiliser un\u00a0<a href=\"https:\/\/www.le-vpn.com\/fr\/\">service VPN<\/a>. Vous vous assurez ainsi qu\u2019aucune personne mal intentionn\u00e9e\u00a0n\u2019\u00e9coute et n\u2019utilise les donn\u00e9es que vous envoyez, m\u00eame\u00a0lors d\u2019une connexion internet non prot\u00e9g\u00e9e. Vous \u00e9vitez que vos\u00a0mots de passe\u00a0bancaires, vos comptes e-mail ou vos profils de r\u00e9seaux sociaux soient intercept\u00e9s et exploit\u00e9s \u00e0 votre insu.<\/p>\n<p>Notre service Le VPN\u00a0code votre connexion\u00a0internet par un\u00a0cryptage\u00a0complexe gr\u00e2ce \u00e0 l\u2019algorithme AES-256. Ce codage rend impossible toute interaction avec vos donn\u00e9es personnelles,\u00a0et cela, m\u00eame lorsque votre connexion a \u00e9t\u00e9 compromise ou intercept\u00e9e. Chaque information que vous envoyez ira directement dans votre tunnel virtuel s\u00e9curis\u00e9. Avec Le VPN vous pouvez facilement diriger votre trafic en choisissant un\u00a0<a href=\"https:\/\/www.le-vpn.com\/fr\/serveurs\/\">serveur<\/a>\u00a0dans l\u2019un des 100+ sites disponibles. Aussi, assurez-vous\u00a0les services du\u00a0<a href=\"https:\/\/www.le-vpn.com\/fr\/temoignages\/\">meilleur VPN<\/a>\u00a0disponible pour une connexion Internet s\u00e9curis\u00e9e, o\u00f9 que vous soyez.<\/p>\n[vc_row][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_row wpb_row vc_row-fluid mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-769f2808f187da\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div data-id=\"mpc_callout-9169f2808f17149\" class=\"mpc-callout mpc-init mpc-callout--style_1 \"><div class=\"mpc-callout__icon-wrap mpc-icon--image\"><div class=\"mpc-callout__icon\"><i class=\"mpc-transition \"><img decoding=\"async\" class=\"\" src=\"https:\/\/www.le-vpn.com\/fr\/wp-content\/uploads\/2025\/09\/exclusive-deal.png\" width=\"100\" height=\"100\" alt=\"exclusive-deal\" title=\"exclusive-deal\" loading=\"lazy\"><\/i><\/div><\/div><div class=\"mpc-callout__content\"><h3 class=\"mpc-callout__heading mpc-typography--preset_1\">OFFRE EXCLUSIVE<\/h3><div data-id=\"mpc_divider-1269f2808f17201\" class=\"mpc-divider-wrap\"><div class=\"mpc-divider mpc-init mpc-align--center mpc-disable--left \"><div class=\"mpc-divider__line mpc-side--left\"><span><\/span><\/div><div class=\"mpc-divider__line mpc-side--right\"><span><\/span><\/div><\/div><\/div><div class=\"mpc-callout__description\"><p>LES 3 PREMI&Egrave;RES ANN&Eacute;ES &Agrave; 2,22 &euro;\/MOIS<\/p>\n<\/div><\/div><div class=\"mpc-callout__button\"><a href=\"https:\/\/www.le-vpn.com\/fr\/acheter-le-vpn\/\" title=\"\" data-id=\"mpc_button-9569f2808f171ab\" class=\"mpc-button mpc-init mpc-transition mpc-typography--preset_2 \"><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">PROFITEZ EN<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--fade mpc-effect-side--in\"><\/div><\/a><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1725366294400 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-2669f2808f179d3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036137534\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>PAS DE JOURNAL<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1699541136156\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>100+ LOCALISATIONS<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-4469f2808f17cb6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036153466\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>P2P autoris&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036161279\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Facile &agrave; utiliser<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-2369f2808f17f7e\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1622661737627\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:13px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Garantie de 30 Jours<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036177713\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Assistance amicale<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3 mpc-column\" data-column-id=\"mpc_column-5669f2808f1824f\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036185445\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Bitcoin accept&eacute;<\/p>\n\t\t<\/div>\n\t<\/div>\n\n\t<div class=\"wpb_raw_code wpb_raw_html wpb_content_element vc_custom_1619036194514\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"font-size:14px;color:#444;text-transform: uppercase;margin-left:20px;\"><svg width=\"16\" style=\"vertical-align: -10%;margin-right:10px;\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 81.68 81.67\"><defs><style>.cls-1{fill:#7ec58e;}.cls-2{fill:#fff;}<\/style><\/defs><path class=\"cls-1\" d=\"M40.84,0A40.84,40.84,0,1,0,81.68,40.84,40.83,40.83,0,0,0,40.84,0Z\"><\/path><g id=\"done\"><g id=\"check-circle-outline\"><polygon class=\"cls-2\" points=\"18.69 39.75 13.55 44.89 30.07 61.41 66.79 24.69 61.65 19.55 30.07 51.13 18.69 39.75\"><\/polygon><\/g><\/g><\/svg>Vitesse de l'&eacute;clair<\/p>\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1701699917169 mpc-row\"><div class=\"wpb_column vc_column_container vc_col-sm-12 mpc-column\" data-column-id=\"mpc_column-8269f2808f18f20\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\r\n<\/div>[\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>Des chercheurs en s\u00e9curit\u00e9 informatique viennent de d\u00e9couvrir un nouveau type de virus capable d&#8217;infecter l&#8217;iPhone d&#8217;Apple, depuis un ordinateur Mac. Cela repr\u00e9sente une menace pour des centaines de milliers d\u2019appareils qui jusqu\u2019\u00e0 aujourd\u2019hui \u00e9taient consid\u00e9r\u00e9s comme r\u00e9sistants aux cybercriminels. Selon les chercheurs de la soci\u00e9t\u00e9 de s\u00e9curit\u00e9 informatique Palo Alto Networks, le virus, nomm\u00e9<\/p>\n","protected":false},"author":10,"featured_media":5469,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_metadesc":"Un virus sur iPhone repr\u00e9sente une v\u00e9ritable menace pour les clients Apple","footnotes":""},"categories":[833],"tags":[321,275,35,251,248,584,583],"yst_prominent_words":[],"class_list":["post-5468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog_old","tag-apple-2","tag-attaque-mobile","tag-cybercrime-2","tag-cybercriminalite","tag-cybersecurite","tag-ipad","tag-iphone"],"_links":{"self":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/5468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/comments?post=5468"}],"version-history":[{"count":2,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/5468\/revisions"}],"predecessor-version":[{"id":7022,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/posts\/5468\/revisions\/7022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media\/5469"}],"wp:attachment":[{"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/media?parent=5468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/categories?post=5468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/tags?post=5468"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.le-vpn.com\/fr\/wp-json\/wp\/v2\/yst_prominent_words?post=5468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}