{"id":3169,"date":"2016-07-19T16:23:19","date_gmt":"2016-07-19T14:23:19","guid":{"rendered":"http:\/\/amg-informatique.fr\/w2\/?p=3169"},"modified":"2016-07-19T16:34:41","modified_gmt":"2016-07-19T14:34:41","slug":"alerte-virus-recrudescence-du-logiciel-rancon-zepto","status":"publish","type":"post","link":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/","title":{"rendered":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO"},"content":{"rendered":"<h2><span style=\"color: #d90009;\">Zepto, une variante de Locky<\/span><\/h2>\n<p>Nous observons actuellement une recrudescence d&rsquo;attaques d&rsquo;une nouvelle version du virus <strong>Locky : ZEPTO.<\/strong><img decoding=\"async\" class=\"lazyload alignright wp-image-3152 size-full\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27182%27%20height%3D%27235%27%20viewBox%3D%270%200%20182%20235%27%3E%3Crect%20width%3D%27182%27%20height%3D%27235%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/zepto-virus.jpg\" alt=\"zepto-virus\" width=\"182\" height=\"235\" \/><\/p>\n<p>Ce logiciel malveillant de type <strong>ransomware<\/strong> se propage par courrier \u00e9lectronique \u00e0 l&rsquo;ouverture d&rsquo;une pi\u00e8ce jointe infect\u00e9e (.doc, .docm, .zip, .xls, &#8230;).<\/p>\n<p>Il s&rsquo;attaque \u00e0 vos <strong>disques durs<\/strong>, vos <strong>disques partag\u00e9s sur les r\u00e9seaux<\/strong> et \u00e0 vos <strong>cl\u00e9s USB<\/strong>. Le programme ajoute l&rsquo;extension <strong>.zepto<\/strong> \u00e0 tous vos fichiers et <strong>crypte<\/strong> toutes les donn\u00e9es importantes de votre syst\u00e8me.<\/p>\n<p>En tr\u00e8s peu de temps, vos donn\u00e9es sont <strong>prises en otages et ran\u00e7onn\u00e9es.<\/strong><\/p>\n<p><img decoding=\"async\" class=\"lazyload alignleft wp-image-3153 size-full\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27182%27%20height%3D%27235%27%20viewBox%3D%270%200%20182%20235%27%3E%3Crect%20width%3D%27182%27%20height%3D%27235%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/zepto-hacker.jpg\" alt=\"zepto-hacker\" width=\"182\" height=\"235\" \/><\/p>\n<h2><span style=\"color: #d90009;\">Une menace toujours aussi dangereuse<\/span><\/h2>\n<p>Il s&rsquo;agit d&rsquo;une menace extr\u00eamement dangereuse et de l&rsquo;un des dispositifs de chiffrement les plus avanc\u00e9s \u00e0 ce jour.<\/p>\n<p>Une fois le virus install\u00e9, un fichier .html figurant dans vos documents vous donne les instructions de paiement.<\/p>\n<p><strong>IL EST FORTEMENT D\u00c9CONSEILL\u00c9 DE PAYER LA RAN\u00c7ON !<\/strong><\/p>\n<p>Car il n&rsquo;existe aucune garantie que le paiement de la ran\u00e7on vous permettra de d\u00e9bloquer et r\u00e9cup\u00e9rer l&rsquo;int\u00e9gralit\u00e9 de vos donn\u00e9es.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\">Nos recommandations contre le virus ZEPTO<\/h3>\n<p>&#8211; V\u00e9rifiez l&rsquo;\u00e9metteur des courriers re\u00e7us avant de les ouvrir.<br \/>\n&#8211; Ne jamais ouvrir la pi\u00e8ce jointe ou cliquer sur un lien dans un courrier \u00e9lectronique suspect ou de provenance douteuse.<br \/>\n&#8211; Dotez-vous d&rsquo;un anti-virus avec une licence \u00e0 jour et d&rsquo;un anti-spam performant.<br \/>\n&#8211; Faites des sauvegardes r\u00e9guli\u00e8res, non connect\u00e9es au r\u00e9seau, de vos syst\u00e8mes et donn\u00e9es.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\">Que faire si votre ordinateur est infect\u00e9 ?<\/h3>\n<p>&#8211; Ne payez en aucun cas une ran\u00e7on : le versement de la ran\u00e7on ne garantit ni le d\u00e9chiffrement des fichiers ni la s\u00e9curit\u00e9 des moyens de paiement utilis\u00e9s. Il peut notamment entra\u00eener l&rsquo;installation de virus suppl\u00e9mentaires sur le poste utilis\u00e9.<br \/>\n&#8211; D\u00e9connectez imm\u00e9diatement les appareils infect\u00e9s des r\u00e9seaux partag\u00e9s, avec ou sans fil.<br \/>\n&#8211; Contactez-nous au plus vite au 03 80 74 24 44.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\">3 options pour optimiser au maximum votre protection<\/h3>\n<p>[one_third valign=\u00a0\u00bbtop\u00a0\u00bb animation=\u00a0\u00bbnone\u00a0\u00bb]<\/p>\n<p><img decoding=\"async\" class=\"lazyload alignnone size-full wp-image-3147 aligncenter\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27182%27%20height%3D%27100%27%20viewBox%3D%270%200%20182%20100%27%3E%3Crect%20width%3D%27182%27%20height%3D%27100%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/logo-sophos.jpg\" alt=\"logo-sophos\" width=\"182\" height=\"100\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #d90009;\"><strong>ANTI-VIRUS SOPHOS<\/strong><\/span><br \/>\nLuttez contre les attaques du quotidien en contr\u00f4lant l&rsquo;utilisation des applications et l&rsquo;acc\u00e8s aux sites web.<br \/>\nGr\u00e2ce \u00e0 la solution de s\u00e9curit\u00e9 AMG, votre soci\u00e9t\u00e9 b\u00e9n\u00e9ficie d&rsquo;une protection de pointe, le tout dans un format cl\u00e9 en main et facile d&rsquo;utilisation.<\/p>\n<p>[\/one_third]<\/p>\n<p>[one_third valign=\u00a0\u00bbtop\u00a0\u00bb animation=\u00a0\u00bbnone\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"lazyload alignnone size-full wp-image-3145\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27182%27%20height%3D%27100%27%20viewBox%3D%270%200%20182%20100%27%3E%3Crect%20width%3D%27182%27%20height%3D%27100%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/logo-mib.jpg\" alt=\"logo-mib\" width=\"182\" height=\"100\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #d90009;\"><strong>ANTISPAM MAIL IN BLACK<\/strong><\/span><br \/>\nCet antispam g\u00e8re la suppression de 100% du spam et garantie de recevoir ses emails importants.<br \/>\nCette technologie permet de diff\u00e9rencier facilement et efficacement vos courriers ind\u00e9sirables des emails publicitaires sans risque.<\/p>\n<p>[\/one_third]<\/p>\n<p>[one_third_last valign=\u00a0\u00bbtop\u00a0\u00bb animation=\u00a0\u00bbnone\u00a0\u00bb]<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"lazyload alignnone size-full wp-image-3146\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27182%27%20height%3D%27100%27%20viewBox%3D%270%200%20182%20100%27%3E%3Crect%20width%3D%27182%27%20height%3D%27100%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"http:\/\/amg-informatique.fr\/w2\/wp-content\/uploads\/logo-sauvegarde.jpg\" alt=\"logo-sauvegarde\" width=\"182\" height=\"100\" \/><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #d90009;\"><strong>SAUVEGARDE A DISTANCE<\/strong><\/span><br \/>\nLa sauvegarde est effectu\u00e9e chaque nuit dans notre Data Center.<br \/>\nTous les types de risques sont \u00e9limin\u00e9s, tant au niveau des virus que des erreurs humaines.<br \/>\nAMG offre une v\u00e9ritable protection des donn\u00e9es ainsi que des options de r\u00e9cup\u00e9ration \u00e0 la pointe de la technologie.<\/p>\n<p>[\/one_third_last]<\/p>\n<p style=\"text-align: center;\">Vous souhaitez obtenir davantage d&rsquo;informations sur l&rsquo;une de ces solutions ?<br \/>\n<span style=\"color: #d90009;\"><strong>Contactez-nous : 03 80 74 24 44.<\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zepto, une variante de Locky Nous observons actuellement une recrudescence d&rsquo;attaques d&rsquo;une nouvelle version du virus Locky : ZEPTO. Ce logiciel malveillant de type ransomware se propage par courrier \u00e9lectronique \u00e0 l&rsquo;ouverture d&rsquo;une pi\u00e8ce jointe infect\u00e9e (.doc, .docm, .zip, .xls, &#8230;). Il s&rsquo;attaque \u00e0 vos disques durs, vos disques partag\u00e9s sur les r\u00e9seaux et \u00e0  [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":3155,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-3169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communication-dentreprise"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9<\/title>\n<meta name=\"description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"og:description\" content=\"Toutes les actualit\u00e9s d&#039;AMG INFORMATIQUE \u00e0 Dijon et au Creusot\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/\" \/>\n<meta property=\"og:site_name\" content=\"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-19T14:23:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-07-19T14:34:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"342\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"AMG INFORMATIQUE\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:site\" content=\"@AMGINFORMATIQUE\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"AMG INFORMATIQUE\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/\"},\"author\":{\"name\":\"AMG INFORMATIQUE\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\"},\"headline\":\"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO\",\"datePublished\":\"2016-07-19T14:23:19+00:00\",\"dateModified\":\"2016-07-19T14:34:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/zepto.jpg\",\"articleSection\":[\"Communication d'entreprise\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/\",\"name\":\"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/zepto.jpg\",\"datePublished\":\"2016-07-19T14:23:19+00:00\",\"dateModified\":\"2016-07-19T14:34:41+00:00\",\"description\":\"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/zepto.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/zepto.jpg\",\"width\":600,\"height\":342},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#website\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"name\":\"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9\",\"description\":\"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#organization\",\"name\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/wp-content\\\/uploads\\\/logoAMG-1.jpg\",\"width\":2139,\"height\":747,\"caption\":\"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AMG.INFORMATIQUE\\\/\",\"https:\\\/\\\/x.com\\\/AMGINFORMATIQUE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amg-informatique\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/#\\\/schema\\\/person\\\/abd28354df3fdad4a59d904d88579540\",\"name\":\"AMG INFORMATIQUE\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g\",\"caption\":\"AMG INFORMATIQUE\"},\"url\":\"https:\\\/\\\/www.amg-informatique.fr\\\/w2\\\/author\\\/amg-informatique\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/","og_locale":"fr_FR","og_type":"article","og_title":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","og_description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","og_url":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/","og_site_name":"AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","article_publisher":"https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","article_published_time":"2016-07-19T14:23:19+00:00","article_modified_time":"2016-07-19T14:34:41+00:00","og_image":[{"width":600,"height":342,"url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg","type":"image\/jpeg"}],"author":"AMG INFORMATIQUE","twitter_card":"summary_large_image","twitter_creator":"@AMGINFORMATIQUE","twitter_site":"@AMGINFORMATIQUE","twitter_misc":{"\u00c9crit par":"AMG INFORMATIQUE","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#article","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/"},"author":{"name":"AMG INFORMATIQUE","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540"},"headline":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO","datePublished":"2016-07-19T14:23:19+00:00","dateModified":"2016-07-19T14:34:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg","articleSection":["Communication d'entreprise"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/","url":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/","name":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO - AMG INFORMATIQUE - Expert en Cybers\u00e9curit\u00e9 et Solutions informatiques en Bourgogne Franche-Comt\u00e9","isPartOf":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#primaryimage"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg","datePublished":"2016-07-19T14:23:19+00:00","dateModified":"2016-07-19T14:34:41+00:00","description":"Toutes les actualit\u00e9s d'AMG INFORMATIQUE \u00e0 Dijon et au Creusot","breadcrumb":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#primaryimage","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/zepto.jpg","width":600,"height":342},{"@type":"BreadcrumbList","@id":"https:\/\/www.amg-informatique.fr\/w2\/alerte-virus-recrudescence-du-logiciel-rancon-zepto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.amg-informatique.fr\/w2\/"},{"@type":"ListItem","position":2,"name":"ALERTE VIRUS : recrudescence du logiciel ran\u00e7on ZEPTO"}]},{"@type":"WebSite","@id":"https:\/\/www.amg-informatique.fr\/w2\/#website","url":"https:\/\/www.amg-informatique.fr\/w2\/","name":"AMG INFORMATIQUE - Cybers\u00e9curit\u00e9","description":"Cybers\u00e9curit\u00e9 et Solutions informatiques pour les professionnels \u00e0 Dijon (21) et au Creusot (71)","publisher":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amg-informatique.fr\/w2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.amg-informatique.fr\/w2\/#organization","name":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9","url":"https:\/\/www.amg-informatique.fr\/w2\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/","url":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","contentUrl":"https:\/\/www.amg-informatique.fr\/w2\/wp-content\/uploads\/logoAMG-1.jpg","width":2139,"height":747,"caption":"AMG INFORMATIQUE - Expert Cybers\u00e9curit\u00e9 Bourgogne Franche-Comt\u00e9"},"image":{"@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AMG.INFORMATIQUE\/","https:\/\/x.com\/AMGINFORMATIQUE","https:\/\/www.linkedin.com\/company\/amg-informatique\/"]},{"@type":"Person","@id":"https:\/\/www.amg-informatique.fr\/w2\/#\/schema\/person\/abd28354df3fdad4a59d904d88579540","name":"AMG INFORMATIQUE","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a038a337a9e93bb21b11baf3f3f7e46de3a269dc6a2c84e5b8154ce875ce8fe8?s=96&d=mm&r=g","caption":"AMG INFORMATIQUE"},"url":"https:\/\/www.amg-informatique.fr\/w2\/author\/amg-informatique\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/comments?post=3169"}],"version-history":[{"count":6,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3169\/revisions"}],"predecessor-version":[{"id":3182,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/posts\/3169\/revisions\/3182"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media\/3155"}],"wp:attachment":[{"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/media?parent=3169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/categories?post=3169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amg-informatique.fr\/w2\/wp-json\/wp\/v2\/tags?post=3169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}