{"id":96035,"date":"2014-07-29T10:21:11","date_gmt":"2014-07-29T08:21:11","guid":{"rendered":"http:\/\/onsoftware.softonic.fr\/?p=96035"},"modified":"2025-06-12T11:48:19","modified_gmt":"2025-06-12T10:48:19","slug":"instagram-faille-critique-decouverte-applis-mobiles","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/fr\/instagram-faille-critique-decouverte-applis-mobiles\/","title":{"rendered":"Des hackers peuvent facilement voler votre compte Instagram et Facebook le sait"},"content":{"rendered":"<p>Une <strong>faille <\/strong>critique a \u00e9t\u00e9 d\u00e9couverte dans les applications mobiles <strong>Instagram<\/strong>. Elle offre notamment la possibilit\u00e9 aux pirates de <strong>voler facilement vos informations d&#8217;utilisateur<\/strong>.<\/p>\n<p>La faille concerne l&#8217;utilisation de l&#8217;application <strong>lors des connexions non chiffr\u00e9es<\/strong>. Cela signifie qu&#8217;un hacker entreprenant peut r\u00e9cup\u00e9rer vos informations personnelles sur un hotspot Wifi ouvert ou m\u00eame sur votre r\u00e9seau cellulaire.<\/p>\n<p>En laissant les donn\u00e9es non crypt\u00e9es, Instagram permet aux pirates d&#8217;avoir acc\u00e8s \u00e0 vos cookies de session qui peuvent \u00eatre utilis\u00e9s<strong> pour usurper votre identit\u00e9<\/strong>. Cette vuln\u00e9rabilit\u00e9 peut donner \u00e0 quelqu&#8217;un l&#8217;acc\u00e8s \u00e0 vos photos priv\u00e9es, votre nom d&#8217;utilisateur et votre mot de passe.<\/p>\n<p>Facebook, qui poss\u00e8de Instagram, connait le probl\u00e8me <strong>depuis 2012,<\/strong> mais ne l&#8217;a toujours pas r\u00e9gl\u00e9. La soci\u00e9t\u00e9 a r\u00e9pondu \u00e0 Mazin Ahmed, le chercheur en s\u00e9curit\u00e9 qui a signal\u00e9 la vuln\u00e9rabilit\u00e9, de cette mani\u00e8re:<\/p>\n<blockquote><p>&#8220;Facebook a discut\u00e9 de cette question en d\u00e9tail et pr\u00e9voit de s\u00e9curiser le site Instagram en HTTPS. Cependant, il n&#8217;y a pas de date pr\u00e9cise pour le changement. Pour le moment Facebook accepte le risque.&#8221;<\/p><\/blockquote>\n<p>Pour l&#8217;instant, les utilisateurs qui veulent se prot\u00e9ger peuvent utiliser le site mobile d&#8217;Instagram qui est crypt\u00e9. Soyez conscient que les r\u00e9seaux Wifi publics sont intrins\u00e8quement moins s\u00fbrs et doivent \u00eatre utilis\u00e9s avec prudence.<\/p>\n<p><em>Source:\u00a0<a title=\"Mazin Ahmed\" href=\"http:\/\/mazinahmed1.blogspot.in\/2014\/07\/session-hijacking-in-instagram-mobile.html\" target=\"_blank\" rel=\"noopener noreferrer\">Mazin Ahmed<\/a> |Via:\u00a0<a title=\"The Hacker News\" href=\"http:\/\/thehackernews.com\/2014\/07\/instagram-mobile-app-issue-leads-to_27.html\" target=\"_blank\" rel=\"noopener noreferrer\">The Hacker News<\/a><\/em><\/p>\n<p><strong>A lire:<\/strong><\/p>\n<p><a href=\"http:\/\/actualites.softonic.fr\/facebook-messenger-contraint-force\"><strong>Facebook Messenger contraint et forc\u00e9<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/actualites.softonic.fr\/facebook-debarque-dans-les-voitures-renault-twingo-captur-clio-4\"><strong>Facebook arrive dans les voitures Renault (Twingo, Captur, Clio 4&#8230;)<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/actualites.softonic.fr\/instagram-fuite-bolt-nouvelle-application-anti-snapchat\"><strong>Instagram fait-elle fuiter Bolt, sa nouvelle application anti-Snapchat?<\/strong><\/a><\/p>\n<p style=\"text-align: right\"><em><em>Suivez-moi sur Twitter:<a href=\"https:\/\/twitter.com\/pierrevitre\" target=\"_blank\" rel=\"noopener noreferrer\"> @pierrevitre<\/a><\/em><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Une faille critique a \u00e9t\u00e9 d\u00e9couverte dans les applications mobiles Instagram. Elle offre notamment la possibilit\u00e9 aux pirates de voler facilement vos informations d&#8217;utilisateur. La faille concerne l&#8217;utilisation de l&#8217;application lors des connexions non chiffr\u00e9es. Cela signifie qu&#8217;un hacker entreprenant peut r\u00e9cup\u00e9rer vos informations personnelles sur un hotspot Wifi ouvert ou m\u00eame sur votre r\u00e9seau &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/fr\/instagram-faille-critique-decouverte-applis-mobiles\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Des hackers peuvent facilement voler votre compte Instagram et Facebook le sait&#8221;<\/span><\/a><\/p>\n","protected":false},"author":8020,"featured_media":96036,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1],"tags":[16806,4933,156,12614,3212],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-96035","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-app-subdomain-redirectioninstagram","tag-faceboo","tag-facebook","tag-instagral","tag-instagram"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/96035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/users\/8020"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/comments?post=96035"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/96035\/revisions"}],"predecessor-version":[{"id":163630,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/96035\/revisions\/163630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media\/96036"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media?parent=96035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/categories?post=96035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/tags?post=96035"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/usertag?post=96035"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/vertical?post=96035"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/content-category?post=96035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}