Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger<\/title>\n<meta name=\"description\" content=\"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger\" \/>\n<meta property=\"og:description\" content=\"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\" \/>\n<meta property=\"og:site_name\" content=\"PhonAndroid\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/phonandroid\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T09:55:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wp-pa.phonandroid.com\/uploads\/2024\/04\/vol-reconnaissance-faciale.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alexandre Mathiot\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:site\" content=\"@phonandroid\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandre Mathiot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\"},\"author\":{\"name\":\"Alexandre Mathiot\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853\"},\"headline\":\"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger\",\"datePublished\":\"2024-04-02T09:55:04+00:00\",\"dateModified\":\"2024-04-02T09:55:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\"},\"wordCount\":622,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"articleSection\":[\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#respond\"]}],\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\",\"url\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\",\"name\":\"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger\",\"isPartOf\":{\"@id\":\"https:\/\/www.phonandroid.com\/#website\"},\"datePublished\":\"2024-04-02T09:55:04+00:00\",\"dateModified\":\"2024-04-02T09:55:04+00:00\",\"description\":\"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.phonandroid.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.phonandroid.com\/#website\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"name\":\"PhonAndroid\",\"description\":\"PhonAndroid\",\"publisher\":{\"@id\":\"https:\/\/www.phonandroid.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.phonandroid.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.phonandroid.com\/#organization\",\"name\":\"PhonAndroid\",\"url\":\"https:\/\/www.phonandroid.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png\",\"contentUrl\":\"https:\/\/img.phonandroid.com\/2023\/06\/dark.png\",\"width\":280,\"height\":60,\"caption\":\"PhonAndroid\"},\"image\":{\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/phonandroid\",\"https:\/\/twitter.com\/phonandroid\",\"https:\/\/www.youtube.com\/user\/Phonandroidtv\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853\",\"name\":\"Alexandre Mathiot\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g\",\"caption\":\"Alexandre Mathiot\"},\"description\":\"Moniteur de plong\u00e9e sous-marine technique. Je suis passionn\u00e9 par les mondes sous-marins. De plus, l'expertise technologique que j'ai acquise dans mes \u00e9tudes d'ing\u00e9nieur me permet d'offrir un enseignement de qualit\u00e9 \u00e0 mes \u00e9l\u00e8ves. Je suis \u00e9galement assez sportif, pratiquant l'apn\u00e9e et la callisth\u00e9nie apr\u00e8s des ann\u00e9es de sports de combat. \u00c0 mes heures perdues, je me plonge dans les news automobiles et moyens de transport en g\u00e9n\u00e9ral. Je suis passionn\u00e9 par les innovations technologiques comme les voitures volantes pour m'imaginer dans un futur \u00e0 la Blade Runner...\",\"url\":\"https:\/\/www.phonandroid.com\/author\/alexandremathiot\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger","description":"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html","og_locale":"fr_FR","og_type":"article","og_title":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger","og_description":"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.","og_url":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html","og_site_name":"PhonAndroid","article_publisher":"https:\/\/www.facebook.com\/phonandroid","article_published_time":"2024-04-02T09:55:04+00:00","og_image":[{"width":1200,"height":750,"url":"https:\/\/wp-pa.phonandroid.com\/uploads\/2024\/04\/vol-reconnaissance-faciale.jpeg","type":"image\/jpeg"}],"author":"Alexandre Mathiot","twitter_card":"summary_large_image","twitter_creator":"@phonandroid","twitter_site":"@phonandroid","twitter_misc":{"Written by":"Alexandre Mathiot","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#article","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html"},"author":{"name":"Alexandre Mathiot","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853"},"headline":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger","datePublished":"2024-04-02T09:55:04+00:00","dateModified":"2024-04-02T09:55:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html"},"wordCount":622,"commentCount":0,"publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"articleSection":["S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#respond"]}],"copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/www.phonandroid.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html","url":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html","name":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger","isPartOf":{"@id":"https:\/\/www.phonandroid.com\/#website"},"datePublished":"2024-04-02T09:55:04+00:00","dateModified":"2024-04-02T09:55:04+00:00","description":"La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque.","breadcrumb":{"@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.phonandroid.com\/"},{"@type":"ListItem","position":2,"name":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger"}]},{"@type":"WebSite","@id":"https:\/\/www.phonandroid.com\/#website","url":"https:\/\/www.phonandroid.com\/","name":"PhonAndroid","description":"PhonAndroid","publisher":{"@id":"https:\/\/www.phonandroid.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.phonandroid.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.phonandroid.com\/#organization","name":"PhonAndroid","url":"https:\/\/www.phonandroid.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.phonandroid.com\/wp-content\/themes\/phonadroid-v3\/assets\/images\/lg-phonandroid-amp-4.png","contentUrl":"https:\/\/img.phonandroid.com\/2023\/06\/dark.png","width":280,"height":60,"caption":"PhonAndroid"},"image":{"@id":"https:\/\/www.phonandroid.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/phonandroid","https:\/\/twitter.com\/phonandroid","https:\/\/www.youtube.com\/user\/Phonandroidtv"]},{"@type":"Person","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/1a6a6318b35d190a7bd77984d9eaa853","name":"Alexandre Mathiot","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.phonandroid.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bbca6bb230ffe967078fb46a73208b0?s=96&d=mm&r=g","caption":"Alexandre Mathiot"},"description":"Moniteur de plong\u00e9e sous-marine technique. Je suis passionn\u00e9 par les mondes sous-marins. De plus, l'expertise technologique que j'ai acquise dans mes \u00e9tudes d'ing\u00e9nieur me permet d'offrir un enseignement de qualit\u00e9 \u00e0 mes \u00e9l\u00e8ves. Je suis \u00e9galement assez sportif, pratiquant l'apn\u00e9e et la callisth\u00e9nie apr\u00e8s des ann\u00e9es de sports de combat. \u00c0 mes heures perdues, je me plonge dans les news automobiles et moyens de transport en g\u00e9n\u00e9ral. Je suis passionn\u00e9 par les innovations technologiques comme les voitures volantes pour m'imaginer dans un futur \u00e0 la Blade Runner...","url":"https:\/\/www.phonandroid.com\/author\/alexandremathiot"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2584670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/users\/150"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/comments?post=2584670"}],"version-history":[{"count":16,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2584670\/revisions"}],"predecessor-version":[{"id":2584679,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/posts\/2584670\/revisions\/2584679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media\/2584673"}],"wp:attachment":[{"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/media?parent=2584670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/categories?post=2584670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phonandroid.com\/wp-json\/wp\/v2\/tags?post=2584670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}

{"id":2584670,"date":"2024-04-02T11:55:04","date_gmt":"2024-04-02T09:55:04","guid":{"rendered":"https:\/\/www.phonandroid.com\/?p=2584670"},"modified":"2024-04-02T11:55:04","modified_gmt":"2024-04-02T09:55:04","slug":"les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger","status":"publish","type":"post","link":"https:\/\/www.phonandroid.com\/les-pirates-volent-votre-visage-pour-deverrouiller-toutes-vos-applications-sensibles-comment-se-proteger.html","title":{"rendered":"Les pirates volent votre visage pour d\u00e9verrouiller toutes vos applications sensibles, comment se prot\u00e9ger"},"content":{"rendered":"

La technologie de reconnaissance faciale, int\u00e9gr\u00e9e \u00e0 nos vies quotidiennes, est d\u00e9sormais la cible d'une nouvelle forme de cyberattaque. D\u00e9couvrez comment s\u00e9curiser votre identit\u00e9 num\u00e9rique face \u00e0 cette menace \u00e9mergente.<\/strong><\/p>\n

\"vol
Source : 123rf<\/figcaption><\/figure>\n

La reconnaissance faciale<\/a> est devenue une commodit\u00e9 moderne, nous permettant d'acc\u00e9der rapidement et en toute s\u00e9curit\u00e9 \u00e0 nos appareils et comptes personnels. De l'ouverture de nos smartphones \u00e0 la validation de transactions bancaires<\/strong>, cette technologie repose sur l'analyse unique des traits de notre visage. Sa facilit\u00e9 d'utilisation et sa rapidit\u00e9 ont favoris\u00e9 son adoption g\u00e9n\u00e9ralis\u00e9e, rempla\u00e7ant les m\u00e9thodes d'authentification traditionnelles par une solution apparemment plus s\u00fbre<\/strong> et plus pratique.<\/p>\n

Cependant, cette avanc\u00e9e n'est pas sans risques. Les cybercriminels ont d\u00e9velopp\u00e9 des m\u00e9thodes sophistiqu\u00e9es pour usurper l'identit\u00e9 faciale des utilisateurs<\/strong>. Ils exploitent l'intelligence artificielle et les technologies de deepfake<\/a>\u00a0pour cr\u00e9er des reproductions num\u00e9riques ou des animations tr\u00e8s r\u00e9alistes<\/strong> du visage d'une personne et acc\u00e9der illicitement \u00e0 des informations personnelles sensibles. Ce type de fraude<\/a>, qui semblait relever de la science-fiction, est devenu une r\u00e9alit\u00e9 pr\u00e9occupante, mettant en \u00e9vidence les vuln\u00e9rabilit\u00e9s de nos syst\u00e8mes de s\u00e9curit\u00e9 num\u00e9rique.<\/p>\n