{"id":126438,"date":"2019-02-19T10:00:50","date_gmt":"2019-02-19T09:00:50","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=126438"},"modified":"2024-06-20T13:32:58","modified_gmt":"2024-06-20T12:32:58","slug":"apple-ou-le-mythe-de-lecosysteme-inviolable","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/","title":{"rendered":"Apple ou le mythe de l\u2019\u00e9cosyst\u00e8me inviolable"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-126436\" title=\"Image utilis\u00e9e sous licence de Shutterstock.com\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg\" alt=\"L'\u00e9cosyst\u00e8me Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield\" width=\"800\" height=\"535\" \/><\/p>\n<p><strong>Avec son \u00e9cosyst\u00e8me verrouill\u00e9 et sa communication savamment orchestr\u00e9e, Apple peaufine son image de citadelle inattaquable. Mais en mati\u00e8re de cybers\u00e9curit\u00e9, personne n\u2019est invuln\u00e9rable.<\/strong><\/p>\n<p>\u201c<em>What happens in your iPhone stays in your iPhone<\/em>\u201d. Sur un gigantesques panneau noir d\u00e9ploy\u00e9 sur 13 \u00e9tages, voici le message en lettres blanches qu\u2019ont pu lire les visiteurs du <a href=\"https:\/\/www.theverge.com\/2019\/1\/5\/18169781\/apple-google-privacy-troll-billboard\" target=\"_blank\" rel=\"noopener noreferrer\">CES<\/a> cette ann\u00e9e. Une grande op\u00e9ration de communication d\u2019Apple pour promouvoir son \u00e9cosyst\u00e8me et se poser en ardent d\u00e9fenseur de la <em>privacy<\/em>. Las, \u00e0 peine trois semaines plus tard, l\u2019entreprise a d\u00fb reconna\u00eetre une importante faille de s\u00e9curit\u00e9 sur <a href=\"https:\/\/9to5mac.com\/2019\/01\/28\/facetime-bug-hear-audio\/\" target=\"_blank\" rel=\"noopener noreferrer\">FaceTime<\/a> permettant d\u2019\u00e9couter des utilisateurs d\u2019iPhone \u00e0 leur insu. Dans la foul\u00e9e, MacOSX a \u00e9t\u00e9 infect\u00e9 par le malware CookieMiner, une attaque permettant de pirater et de voler les cryptomonnaies d\u00e9tenues par les victimes. Et apr\u00e8s la d\u00e9couverte d\u2019<a href=\"https:\/\/securityaffairs.co\/wordpress\/80788\/hacking\/macos-mojave-0day.html\" target=\"_blank\" rel=\"noopener noreferrer\">une vuln\u00e9rabilit\u00e9 <em>Zero Day<\/em><\/a> sur la nouvelle version de macOS, Mojave, le d\u00e9but d\u2019ann\u00e9e 2019 confirme \u00e0 lui seul qu\u2019en mati\u00e8re de s\u00e9curit\u00e9, personne n\u2019est invuln\u00e9rable. Pas m\u00eame la marque \u00e0 la pomme.<\/p>\n<p>En octobre 2020, plusieurs hackers \u2013 Brett Buerhaus, Tanner Barnes, Sam Curry, Samuel Erb et Ben Sadeghipour \u2013 se sont lanc\u00e9s \u00e0 l'assaut du programme de Bug Bounty d'Apple. Le r\u00e9sultat est sans appel : <a href=\"https:\/\/samcurry.net\/hacking-apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">un total de 55 vuln\u00e9rabilit\u00e9s d\u00e9couvertes<\/a>, dont 11 critiques et 29 au niveau s\u00e9v\u00e8re...<\/p>\n<p>&nbsp;<\/p>\n<h2>Le mythe de l\u2019inviolabilit\u00e9 d\u2019Apple<\/h2>\n<p>Pourtant, Apple a longtemps \u00e9t\u00e9 per\u00e7u comme un syst\u00e8me inviolable. Un mythe qui s\u2019explique par trois grandes raisons, selon <strong>David Gueluy<\/strong>, Innovation leader chez Stormshield. \u00ab\u00a0<em>Historiquement, Apple a d\u2019abord \u00e9t\u00e9 \u00e9pargn\u00e9 par les attaques parce qu\u2019il comptait moins d\u2019utilisateurs que Microsoft ; il n\u2019\u00e9tait donc pas une cible de choix. Ensuite, l\u2019\u00e9cosyst\u00e8me ferm\u00e9 d\u2019Apple donne une illusion de ma\u00eetrise et d\u2019imperm\u00e9abilit\u00e9 aux attaques. Enfin, la protection de la vie priv\u00e9e est devenu un argument commercial d\u2019Apple, qui communique beaucoup dessus et renforce ainsi dans les esprits une association entre Apple et la notion de s\u00e9curit\u00e9.<\/em> \u00bb<\/p>\n<p>Mais depuis plusieurs ann\u00e9es, Apple est devenu une cible r\u00e9currente des attaques. Les succ\u00e8s de l\u2019iPhone et du MacBook ont dop\u00e9 le nombre d\u2019utilisateurs de l\u2019\u00e9cosyst\u00e8me Apple, et leur profil \u2013 plut\u00f4t CSP + et VIP \u2013 aiguise les app\u00e9tits. \u00ab <em>La motivation des cyberattaques est souvent p\u00e9cuniaire<\/em> \u00bb, rappelle David Gueluy. R\u00e9sultat : les vuln\u00e9rabilit\u00e9s d\u00e9couvertes sur les produits d'Apple se multiplient, parfois avec un fort \u00e9cho m\u00e9diatique, comme le piratage d\u2019iCloud en 2014, o\u00f9 plusieurs stars hollywoodiennes avaient vu leurs donn\u00e9es compromises et leur intimit\u00e9 expos\u00e9e. \u00ab <em>Le cas d\u2019iCloud est embl\u00e9matique car il rappelle que la s\u00e9curit\u00e9 est un probl\u00e8me global : on a tendance \u00e0 beaucoup penser mat\u00e9riel (smartphone, tablette, ordinateur), or tous les services et outils utilis\u00e9s apportent des risques suppl\u00e9mentaires<\/em> \u00bb, note David Gueluy.<\/p>\n<blockquote><p><em>La s\u00e9curit\u00e9 est un probl\u00e8me global : on a tendance \u00e0 beaucoup penser mat\u00e9riel (smartphone, tablette, ordinateur), or tous les services et outils utilis\u00e9s apportent des risques suppl\u00e9mentaires<\/em><\/p>\n<pre><strong>David Gueluy,<\/strong> Innovation leader Stormshield<\/pre>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<h2>L\u2019App Store, nid d\u2019espions<\/h2>\n<p>De quoi faire dire \u00e0 certains que l\u2019utilisateur Mac n\u2019est pas plus prot\u00e9g\u00e9 qu\u2019un utilisateur Windows. Un coup d\u2019\u0153il au <a href=\"https:\/\/nvd.nist.gov\/vuln\/search\/results?form_type=Basic&amp;results_type=overview&amp;query=apple&amp;search_type=all\" target=\"_blank\" rel=\"noopener noreferrer\">National Vulnerability Database<\/a> suffit pour constater que l\u2019\u00e9cosyst\u00e8me Apple conna\u00eet lui aussi son lot de CVE (<em>Common Vulnerabilities and Exposures<\/em>).<\/p>\n<p>D\u00e9sormais, un tiers des attaques ciblent les <a href=\"https:\/\/www.globalsecuritymag.fr\/ROOMn-un-tiers-des-attaques,20180312,77473.html\" target=\"_blank\" rel=\"noopener noreferrer\">mobiles<\/a>. Si Android reste l\u2019OS le plus vis\u00e9, iOS est \u00e9galement vuln\u00e9rable. Avant l\u2019arriv\u00e9e du malware CookieMiner en 2019, citons p\u00eale-m\u00eale le malware XCodeGhost (qui aurait infect\u00e9 plus de 4000 applications de l\u2019App Store), le spyware Pegasus, le cheval de Troie Acedeceiver ou encore le <a href=\"https:\/\/www.stormshield.com\/fr\/zero-ransomware\/\">ransomware<\/a> KeRanger.<\/p>\n<p>&nbsp;<\/p>\n<h2>L\u2019utilisateur Apple, premier facteur de vuln\u00e9rabilit\u00e9<\/h2>\n<p>\u00ab <em>Les \u00e9cosyst\u00e8mes sont de plus en plus robustes. Aujourd\u2019hui, le point d\u2019entr\u00e9e le plus vuln\u00e9rable, c\u2019est l\u2019utilisateur<\/em> \u00bb, souligne un chercheur en s\u00e9curit\u00e9 chez Stormshield. Il existe pourtant des bonnes pratiques simples que chacun peut mettre en \u0153uvre pour limiter les risques. \u00ab <em>Comme tous les \u00e9diteurs, Apple a des \u00e9quipes d\u00e9di\u00e9es qui travaillent \u00e0 la r\u00e9solution des vuln\u00e9rabilit\u00e9s. La pratique de cybers\u00e9curit\u00e9 num\u00e9ro une est donc de se mettre r\u00e9guli\u00e8rement \u00e0 jour<\/em> \u00bb, rappelle-t-il.<\/p>\n<p>Ne pas t\u00e9l\u00e9charger de pi\u00e8ce-jointe suspecte, opter pour une authentification \u00e0 deux facteurs ou encore d\u00e9finir un mot de passe fort et en changer r\u00e9guli\u00e8rement sont \u00e9galement des r\u00e9flexes basiques \u00e0 avoir. Et, bien s\u00fbr, n\u2019installer que des applications dont on conna\u00eet la source. \u00ab <em>Il faut soit la t\u00e9l\u00e9charger de l\u2019App Store, soit aller la chercher sur le site officiel de l\u2019\u00e9diteur<\/em> \u00bb, note encore ce sp\u00e9cialiste en cybers\u00e9curit\u00e9. Pour \u00e9viter de se retrouver avec une application malveillante, on contr\u00f4le l\u2019identit\u00e9 de l\u2019\u00e9diteur, pour voir s\u2019il s\u2019agit bien du m\u00eame que celui d\u2019autres applications dans le store, on regarde les commentaires et surtout\u2026 son prix. Si l\u2019application est beaucoup moins ch\u00e8re que le prix attendu, c\u2019est suspect. \u00ab <em>Il s\u2019agit des m\u00eames r\u00e8gles de vigilance que pour le phishing,<\/em> r\u00e9sume <strong>Julien Paffumi<\/strong>, Product Portfolio Manager chez Stormshield. <em>Si c\u2019est trop beau pour \u00eatre vrai, c\u2019est tr\u00e8s certainement un pi\u00e8ge !<\/em> \u00bb<\/p>\n<p>&nbsp;<\/p>\n<p>Et le ph\u00e9nom\u00e8ne ne concerne plus seulement les usages personnels. Avec une puissance accrue, de nouvelles fonctionnalit\u00e9s et des campagnes marketing efficaces, les diff\u00e9rents produits Apple trouvent leur place <a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-apple-trouve-sa-place-dans-l-entreprise-73329.html\" target=\"_blank\" rel=\"noopener noreferrer\">dans les entreprises<\/a>. Pour ces entreprises, des solutions plus pouss\u00e9es permettent de se prot\u00e9ger sur plusieurs niveaux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avec son \u00e9cosyst\u00e8me verrouill\u00e9 et sa communication savamment orchestr\u00e9e, Apple peaufine son image de citadelle inattaquable. Mais en mati\u00e8re de cybers\u00e9curit\u00e9, personne n\u2019est invuln\u00e9rable. \u201cWhat happens in your iPhone stays in your iPhone\u201d. Sur un gigantesques panneau noir d\u00e9ploy\u00e9 sur 13 \u00e9tages, voici le message&#8230;<\/p>\n","protected":false},"author":31,"featured_media":126436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1612],"tags":[4368],"business_size":[682,683,681],"industry":[],"help_mefind":[],"features":[],"type_security":[754,756,758],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1570,1530],"class_list":["post-126438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite","tag-la-cybersecurite-par-stormshield","business_size-eti","business_size-grande-entreprise","business_size-pme","type_security-donnees","type_security-postes-et-serveurs","type_security-reseaux","listing_product-sds-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield<\/title>\n<meta name=\"description\" content=\"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield\" \/>\n<meta property=\"og:description\" content=\"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-19T09:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-20T12:32:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Victor Poitevin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Victor Poitevin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/\"},\"author\":{\"name\":\"Victor Poitevin\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"headline\":\"Apple ou le mythe de l\u2019\u00e9cosyst\u00e8me inviolable\",\"datePublished\":\"2019-02-19T09:00:50+00:00\",\"dateModified\":\"2024-06-20T12:32:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/\"},\"wordCount\":986,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_17645110.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Veille s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/\",\"name\":\"Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_17645110.jpg\",\"datePublished\":\"2019-02-19T09:00:50+00:00\",\"dateModified\":\"2024-06-20T12:32:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\"},\"description\":\"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_17645110.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_17645110.jpg\",\"width\":1000,\"height\":669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/apple-ou-le-mythe-de-lecosysteme-inviolable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple ou le mythe de l\u2019\u00e9cosyst\u00e8me inviolable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/0adf015dda8f00b6273db9b417b12da2\",\"name\":\"Victor Poitevin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g\",\"caption\":\"Victor Poitevin\"},\"description\":\"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield","description":"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/","og_locale":"fr_FR","og_type":"article","og_title":"Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield","og_description":"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/","og_site_name":"Stormshield","article_published_time":"2019-02-19T09:00:50+00:00","article_modified_time":"2024-06-20T12:32:58+00:00","og_image":[{"width":1000,"height":669,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg","type":"image\/jpeg"}],"author":"Victor Poitevin","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Victor Poitevin","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/"},"author":{"name":"Victor Poitevin","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"headline":"Apple ou le mythe de l\u2019\u00e9cosyst\u00e8me inviolable","datePublished":"2019-02-19T09:00:50+00:00","dateModified":"2024-06-20T12:32:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/"},"wordCount":986,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Veille s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/","name":"Apple est-il vraiment imperm\u00e9able aux cyberattaques ? | Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg","datePublished":"2019-02-19T09:00:50+00:00","dateModified":"2024-06-20T12:32:58+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2"},"description":"Les produits et services Apple face aux cyberattaques, retour sur un mythe de cybers\u00e9curit\u00e9 avec David Gueluy, Innovation leader chez Stormshield.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_17645110.jpg","width":1000,"height":669},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/apple-ou-le-mythe-de-lecosysteme-inviolable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Apple ou le mythe de l\u2019\u00e9cosyst\u00e8me inviolable"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/0adf015dda8f00b6273db9b417b12da2","name":"Victor Poitevin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0b6fdfc0b3c6bba351213934a589a60b221b4d00f83fe3bd4fb637c5e541d0e1?s=96&d=mm&r=g","caption":"Victor Poitevin"},"description":"Victor is Stormshield\u2019s Editorial &amp; Digital Manager. Attached to the Marketing Department, his role is to improve the Group\u2019s online visibility. This involves Stormshield\u2019s entire ecosystem, including websites, social networks and blogs. He will make use of his diverse experience, gained in several major French and international groups and communications agencies, to fulfill the Group\u2019s high digital aspirations."}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=126438"}],"version-history":[{"count":10,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126438\/revisions"}],"predecessor-version":[{"id":548849,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/126438\/revisions\/548849"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/126436"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=126438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=126438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=126438"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=126438"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=126438"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=126438"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=126438"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=126438"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=126438"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=126438"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=126438"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=126438"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=126438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}