{"id":80570,"date":"2026-04-20T12:04:12","date_gmt":"2026-04-20T12:04:12","guid":{"rendered":"https:\/\/www.europesays.com\/be-fr\/80570\/"},"modified":"2026-04-20T12:04:12","modified_gmt":"2026-04-20T12:04:12","slug":"non-votre-iphone-nest-pas-forcement-sur-ecoute-attention-a-cette-arnaque","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/be-fr\/80570\/","title":{"rendered":"Non, votre iPhone n\u2019est pas forc\u00e9ment sur \u00e9coute, attention \u00e0 cette arnaque"},"content":{"rendered":"<p>Une nouvelle <a href=\"https:\/\/www.20minutes.fr\/dossier\/arnaque\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">arnaque<\/a> jouant sur la peur d\u2019un danger imminent a \u00e9t\u00e9 rep\u00e9r\u00e9e par les sp\u00e9cialistes de <a href=\"https:\/\/www.20minutes.fr\/dossier\/cybersecurite\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">la cybers\u00e9curit\u00e9<\/a>. Ce \u00ab\u00a0scareware\u00a0\u00bb vise les d\u00e9tenteurs d\u2019iPhone, a qui il envoie une notification alarmante semblant provenir du \u00ab\u00a0service s\u00e9curit\u00e9 de la plateforme Apple\u00a0\u00bb.<\/p>\n<p>Le message pr\u00e9vient qu\u2019une \u00e9coute t\u00e9l\u00e9phonique a \u00e9t\u00e9 d\u00e9tect\u00e9e sur l\u2019appareil et invite l\u2019utilisateur \u00e0 cliquer sur un bouton \u00ab\u00a0Faire un test\u00a0\u00bb, rapporte <a href=\"https:\/\/www.tf1info.fr\/high-tech\/arnaque-une-ecoute-telephonique-sur-votre-apple-iphone-mefiez-vous-de-ce-message-2436355.html\" rel=\"nofollow noopener\" target=\"_blank\" class=\"c-link c-link--is-underlined\">TF1 Info<\/a>.<\/p>\n<p>Un visuel trompeur<\/p>\n<p>\u00ab\u00a0Le syst\u00e8me de s\u00e9curit\u00e9 a d\u00e9tect\u00e9 une \u00e9coute t\u00e9l\u00e9phonique sur votre Apple <a href=\"https:\/\/www.20minutes.fr\/high-tech\/iphone\/\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">iPhone<\/a>. Effectuez une v\u00e9rification des fichiers sur votre appareil.\u00a0\u00bb, indique pr\u00e9cis\u00e9ment l\u2019alerte re\u00e7ue par les victimes. Le bouton pr\u00e9sent\u00e9 comme un moyen de d\u00e9couvrir si <a href=\"https:\/\/www.20minutes.fr\/high-tech\/smartphone\/\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">le smartphone<\/a> est \u00ab\u00a0vraiment\u00a0\u00bb infect\u00e9 renvoie vers une page Web imitant parfaitement le site officiel de la marque \u00e0 la pomme. Les identifiants Apple et des informations personnelles sont alors demand\u00e9s \u00e0 l\u2019utilisateur. C\u2019est l\u00e0 que le pi\u00e8ge se referme.<\/p>\n<p>Si <a href=\"https:\/\/www.20minutes.fr\/dossier\/cybercriminalite\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">les cybercriminels<\/a> r\u00e9cup\u00e8rent les identifiants, ils peuvent ensuite prendre le contr\u00f4le de nombreuses fonctionnalit\u00e9s de l\u2019iPhone et notamment effectuer des paiements avec les cartes bancaires enregistr\u00e9es. Comme <a href=\"https:\/\/www.20minutes.fr\/high-tech\/apple\/\" class=\"c-link c-link--is-underlined\" rel=\"nofollow noopener\" target=\"_blank\">Apple<\/a> le pr\u00e9cise <a href=\"https:\/\/support.apple.com\/fr-fr\/102568\" rel=\"nofollow noopener\" target=\"_blank\" class=\"c-link c-link--is-underlined\">sur sa page d\u00e9di\u00e9e \u00e0 la lutte contre l\u2019hame\u00e7onnage<\/a>, il est recommand\u00e9 aux clients de \u00ab\u00a0partir du principe qu\u2019il s\u2019agit d\u2019une escroquerie\u00a0\u00bb d\u00e8s qu\u2019une fen\u00eatre contextuelle pr\u00e9tend que votre appareil a un probl\u00e8me de s\u00e9curit\u00e9.<\/p>\n","protected":false},"excerpt":{"rendered":"Une nouvelle arnaque jouant sur la peur d\u2019un danger imminent a \u00e9t\u00e9 rep\u00e9r\u00e9e par les sp\u00e9cialistes de la&hellip;\n","protected":false},"author":2,"featured_media":80571,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[449,450,433,12,13,18,17,7394,596,7985,7398,4151,1108,73,71,75,72,476,76,74,20016],"class_list":{"0":"post-80570","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sciences-et-technologies","8":"tag-actualite","9":"tag-apple","10":"tag-arnaque","11":"tag-be","12":"tag-be-fr","13":"tag-belgique","14":"tag-belgium","15":"tag-cybercriminalite","16":"tag-cybersecurite","17":"tag-escroquerie","18":"tag-hacker","19":"tag-high-tech","20":"tag-iphone","21":"tag-science","22":"tag-science-and-technology","23":"tag-sciences","24":"tag-sciences-et-technologies","25":"tag-societe","26":"tag-technologies","27":"tag-technology","28":"tag-telephonie"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@be_fr\/116436944151962038","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/posts\/80570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/comments?post=80570"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/posts\/80570\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/media\/80571"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/media?parent=80570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/categories?post=80570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/be-fr\/wp-json\/wp\/v2\/tags?post=80570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}