{"id":8410,"date":"2016-08-23T07:46:53","date_gmt":"2016-08-23T07:46:53","guid":{"rendered":"https:\/\/yeeply.com\/fr\/blog\/?p=2692"},"modified":"2024-05-07T13:05:25","modified_gmt":"2024-05-07T11:05:25","slug":"risques-de-securite-developpement-android","status":"publish","type":"post","link":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/","title":{"rendered":"6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">\u00c9tant le syst\u00e8me d\u2019exploitation le plus utilis\u00e9 dans le secteur mobile, Android constitue la cible principale des cyber-pirates. Les <a href=\"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/developpement-android-utilisation-des-ressources\/\">experts en d\u00e9veloppement Android<\/a> devraient consacrer une attention particuli\u00e8re aux questions de s\u00e9curit\u00e9 lors de la cr\u00e9ation des applications mobiles. Mais quels risques de s\u00e9curit\u00e9 cache-t-il le robot vert ?<\/p>\n<div class=\"bt-proyecto\"><a href=\"https:\/\/yeeply.com\/fr\/developpement-applications\/?rel=FR-BT-proyecto-app#publish-project\" target=\"_blank\" rel=\"noopener\">VOUS VOULEZ CR\u00c9ER UNE APPLICATION ? PARLEZ-NOUS DE VOTRE PROJET \u270c\ufe0f<\/a><\/div>\n<h2 style=\"text-align: left;\">1. Les logiciel malveillants ou <em>malware<\/em> en anglais<\/h2>\n<p style=\"text-align: justify;\">Selon l\u2019entreprise Zimperium sp\u00e9cialis\u00e9e en s\u00e9curit\u00e9 mobile, 95% des appareils Android sont vuln\u00e9rables \u00e0 ce <a href=\"https:\/\/yeeply.com\/fr\/blog\/tendances-competences\/menaces-cybersecurite-2019\/\">type d&rsquo;cyberattaque<\/a>. On a identifi\u00e9 environ 75 000 menaces <em>malware<\/em> qui ciblent Android. Ces virus proviennent le plus souvent des applications t\u00e9l\u00e9charg\u00e9es hors Google Play.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2694 size-full\" title=\"logo android faille\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-dapplication-Android.png\" alt=\"logo android faille\" width=\"300\" height=\"311\" srcset=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-dapplication-Android.png 300w, https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-dapplication-Android-289x300.png 289w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: justify;\">Dans 79% des cas, le virus fait monter la facture de t\u00e9l\u00e9phone, en envoyant des SMS ou en effectuant des appels sans permission de l\u2019utilisateur. Selon Movisfera, les <em>malware<\/em>\u00a0les plus communs sont:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Andr \/ Pjapps-C<\/strong>: Ce sont des applications souvent payantes qui ont \u00e9t\u00e9 pirat\u00e9es \u00e0 l\u2019aide d\u2019un \u00ab\u00a0outil disponible publiquement\u00a0\u00bb. Elles ne\u00a0 sont pas forc\u00e9ment malveillantes, mais peuvent \u00eatre ill\u00e9gales.<\/li>\n<li style=\"text-align: justify;\"><strong>Andr \/ BBridge-A<\/strong>: Ce <em>malware<\/em> installe d\u2019autres applications malveillantes sur un appareil Android et transmet des informations personnelles de l\u2019utilisateur \u00e0 un serveur HTTP. Les applications install\u00e9es peuvent envoyer des SMS surtax\u00e9s sans que l\u2019utilisateur d\u2019en rende compte.<\/li>\n<li style=\"text-align: justify;\"><strong>Andr \/ Generic-S<\/strong>: Il installe des <em>adware<\/em>, c\u2019est-\u00e0-dire, des logiciels espions \u00e0 but publicitaire.<\/li>\n<li style=\"text-align: justify;\"><strong>Andr \/ Batterd-A<\/strong>: Connu \u00e9galement sous le nom de <em>Battery Doctor<\/em>, cette application promet \u00e0 l\u2019utilisateur d\u2019allonger la dur\u00e9e de vie de la batterie. En r\u00e9alit\u00e9, elle se sert des donn\u00e9es personnelles de l\u2019utilisateur pour afficher \u00e9norm\u00e9ment de publicit\u00e9s.<\/li>\n<li style=\"text-align: justify;\"><strong>Andr \/ DrSheep-A\u00a0:<\/strong> Il permet au hacker de pirater les comptes Twitter, Facebook et LinkedIn de l\u2019utilisateur.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"aligncenter wp-image-2695 size-full\" title=\"statistiques developpement\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-Android.png\" alt=\"statistiques developpement\" width=\"497\" height=\"239\" srcset=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-Android.png 497w, https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2016\/08\/S\u00e9curit\u00e9-dans-le-d\u00e9veloppement-Android-300x144.png 300w\" sizes=\"(max-width: 497px) 100vw, 497px\" \/><\/p>\n<p style=\"text-align: center;\">Source: <a href=\"https:\/\/www.cnet.com\/es\/noticias\/fragmentacion-android-2015\/\">CNet<\/a><\/p>\n<h2 style=\"text-align: left;\">2. La fragmentation du march\u00e9 Android<\/h2>\n<p>Les smartphones Android ne fonctionnent pas tous sous la m\u00eame version du syst\u00e8me d\u2019exploitation. De nombreux utilisateurs n\u2019ont jamais mis \u00e0 jour leur Android, et Google ne les obligent pas de le faire. Certains smartphones n\u2019ont pas assez de m\u00e9moire pour installer les mises \u00e0 jour.<\/p>\n<p style=\"text-align: justify;\">Ces smartphones continuent bien \u00e9videmment de fonctionner, mais faute de mises \u00e0 jour, ils sont plus expos\u00e9s aux risques de s\u00e9curit\u00e9 li\u00e9s \u00e0 la programmation. En effet, les d\u00e9veloppeurs corrigent r\u00e9guli\u00e8rement les failles identifi\u00e9es mais l\u2019utilisateur ne peut pas en profiter s\u2019il n\u2019installe pas la mise \u00e0 jour. Comme le prouvent ces donn\u00e9es, de nombreux utilisateurs choisissent de ne pas faire de mises \u00e0 jour:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Lollipop<\/strong> 5.0 et 5.1 : 18,1% des appareils<\/li>\n<li style=\"text-align: justify;\"><strong>KitKat<\/strong> 4.4 : 39,3% des appareils<\/li>\n<li style=\"text-align: justify;\"><strong>JellyBean<\/strong> 4.1 \u00e0 4.3 : 33,6% des appareils<\/li>\n<li style=\"text-align: justify;\"><strong>Autres versions<\/strong> plus anciennes: 9% des appareils<\/li>\n<\/ul>\n<h2 style=\"text-align: left;\">3. Les syst\u00e8mes d&rsquo;exploitation personnalis\u00e9s<\/h2>\n<p style=\"text-align: justify;\">La possibilit\u00e9 de personnaliser les smartphones Android constitue \u00e9galement un risque pour la s\u00e9curit\u00e9. Dans certains cas, les constructeurs de smartphones (tels que Samsung, HTC ou Huawei) modifient le syst\u00e8me d&rsquo;exploitation Android pour lier leur appareils \u00e0 celui-ci.<\/p>\n<p style=\"text-align: justify;\">Les utilisateurs, \u00e0 leur tour, peuvent personnaliser leur Android avec ce qu\u2019on appelle <em>launchers<\/em> alternatifs. Le launcher est l\u2019\u00e9quivalent du bureau sous Android o\u00f9 se trouvent les ic\u00f4nes des applications les plus fr\u00e9quemment utilis\u00e9es. Le <em>launcher<\/em> install\u00e9 par le constructeur peut\u00a0\u00eatre remplac\u00e9 par un autre. Certains launchers peuvent n\u00e9anmoins provoquer des br\u00e8ches de s\u00e9curit\u00e9. Le plus souvent l\u2019utilisateur court le risque de tomber victime du <em>phishing\u00a0<\/em>: les param\u00e8tres des ic\u00f4nes sur l\u2019\u00e9cran sont modifi\u00e9s et ne renvoient plus \u00e0 l\u2019application d\u2019origine.<\/p>\n<h2 style=\"text-align: left;\">4. Les t\u00e9l\u00e9chargements d&rsquo;applications en dehors de Google Play Store<\/h2>\n<p style=\"text-align: justify;\">La documentation concertant le d\u00e9veloppement Android est tr\u00e8s facile d\u2019acc\u00e8s, car disponible en open source. Cela veut dire que tout d\u00e9veloppeur peut apprendre \u00e0 cr\u00e9er une application malveillante. Fa\u00eetes attention\u00a0!<\/p>\n<p style=\"text-align: justify;\">Les utilisateurs choisissent parfois de t\u00e9l\u00e9charger des applications depuis des sites non officiels pour ne pas devoir payer. Ce faisant, ils tombent souvent sur l\u2019app qui a \u00e9t\u00e9 modifi\u00e9e par le pirate pour installer un virus sur le smartphone.<\/p>\n<h2 style=\"text-align: left;\">5. Les applications malveillantes sur Google Play Store<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/yeeply.com\/fr\/blog\/marketing\/app-store-optimization-bonnes-mauvaises-pratiques\/\">La publication d\u2019une application Android sur Google Play<\/a> est tr\u00e8s simple. En outre, Android est actuellement la plateforme mobile la plus\u00a0r\u00e9pandue\u00a0\u00e0 travers le monde et chaque jour des centaines d\u2019applications sont publi\u00e9es. Bien que Google essaie d\u2019\u00e9radiquer les <em>malwares<\/em> de son store, certains arrivent \u00e0 \u00e9chapper \u00e0 son filtre. Dans certains cas, Google peut d\u00e9sinstaller \u00e0 distance une application malveillante de l\u2019appareil de l\u2019utilisateur pour assurer sa s\u00e9curit\u00e9.<\/p>\n<h2 style=\"text-align: left;\">6. Plateformes de d\u00e9veloppement Android<\/h2>\n<p style=\"text-align: justify;\">Enfin, les dysfonctionnements des plateformes de d\u00e9veloppement Android peuvent \u00e9galement \u00eatre \u00e0 l\u2019origine de failles de s\u00e9curit\u00e9. <em>Heartbleed<\/em>, la faille de s\u00e9curit\u00e9 d\u2019ampleur mondiale pr\u00e9sente dans la biblioth\u00e8que open source\u00a0OpenSSL. Ce type d\u2019incident ne d\u00e9pend malheureusement pas des intentions du d\u00e9veloppeur ni du comportement de l\u2019utilisateur, et il n\u2019existe pas de moyen de s\u2019en prot\u00e9ger.<\/p>\n<p style=\"text-align: justify;\">Il n\u2019y a pas de software infaillible. La bonne nouvelle est que les failles sont d\u00e9tect\u00e9es rapidement et les mises \u00e0 jour permettent de r\u00e9soudre la plupart des probl\u00e8mes de s\u00e9curit\u00e9 li\u00e9s au d\u00e9veloppement Android. Enfin, il faut souligner que <a href=\"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/securite-developpement-mobile-autorisations\/\">de nombreux dangers viennent du comportement l\u2019utilisateur<\/a>\u2026 mais il n\u2019est jamais trop tard pour appliquer les bonnes pratiques!<\/p>\n<p><a href=\"https:\/\/yeeply.com\/fr\/developpement-applications\/?rel=FR-BP-proyecto-app#publish-project\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2020\/04\/FR-CTA-projet-app.png\" alt=\"Proyecto App\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \u00c9tant le syst\u00e8me d\u2019exploitation le plus utilis\u00e9 dans le secteur mobile, Android constitue la cible principale des cyber-pirates. Les experts en d\u00e9veloppement Android devraient &#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[302],"tags":[],"class_list":["post-8410","post","type-post","status-publish","format-standard","hentry","category-developpement-applications-mobiles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android<\/title>\n<meta name=\"description\" content=\"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android\" \/>\n<meta property=\"og:description\" content=\"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Yeeply\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YeeplyMobile\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-23T07:46:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T11:05:25+00:00\" \/>\n<meta name=\"author\" content=\"Yeeply\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:site\" content=\"@Yeeply_EN\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yeeply\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/\"},\"author\":{\"name\":\"Yeeply\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\"},\"headline\":\"6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android\",\"datePublished\":\"2016-08-23T07:46:53+00:00\",\"dateModified\":\"2024-05-07T11:05:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/\"},\"wordCount\":910,\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\"},\"articleSection\":[\"App\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/\",\"name\":\"Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#website\"},\"datePublished\":\"2016-08-23T07:46:53+00:00\",\"dateModified\":\"2024-05-07T11:05:25+00:00\",\"description\":\"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/blog\\\/developpement-applications-mobiles\\\/risques-de-securite-developpement-android\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\",\"name\":\"Yeeply\",\"description\":\"A platform for the development of digital projects\",\"publisher\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#organization\",\"name\":\"Yeeply\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"contentUrl\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/logo_yeeply_black@2x.png\",\"width\":360,\"height\":120,\"caption\":\"Yeeply\"},\"image\":{\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YeeplyMobile\\\/\",\"https:\\\/\\\/x.com\\\/Yeeply_EN\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/yeeply\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/#\\\/schema\\\/person\\\/c7927839158c47143448f3bcdaf7cc14\",\"name\":\"Yeeply\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g\",\"caption\":\"Yeeply\"},\"url\":\"https:\\\/\\\/yeeply.com\\\/fr\\\/author\\\/yeeply\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android","description":"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/","og_locale":"fr_FR","og_type":"article","og_title":"Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android","og_description":"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705","og_url":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/","og_site_name":"Yeeply","article_publisher":"https:\/\/www.facebook.com\/YeeplyMobile\/","article_published_time":"2016-08-23T07:46:53+00:00","article_modified_time":"2024-05-07T11:05:25+00:00","author":"Yeeply","twitter_card":"summary_large_image","twitter_creator":"@Yeeply_EN","twitter_site":"@Yeeply_EN","twitter_misc":{"\u00c9crit par":"Yeeply","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/#article","isPartOf":{"@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/"},"author":{"name":"Yeeply","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14"},"headline":"6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android","datePublished":"2016-08-23T07:46:53+00:00","dateModified":"2024-05-07T11:05:25+00:00","mainEntityOfPage":{"@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/"},"wordCount":910,"publisher":{"@id":"https:\/\/yeeply.com\/fr\/#organization"},"articleSection":["App"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/","url":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/","name":"Les 6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android","isPartOf":{"@id":"https:\/\/yeeply.com\/fr\/#website"},"datePublished":"2016-08-23T07:46:53+00:00","dateModified":"2024-05-07T11:05:25+00:00","description":"75 000 menaces malwares, le phishing et des applications malveillantes. Comment \u00e9viter les risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android ? \u2705","breadcrumb":{"@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/yeeply.com\/fr\/blog\/developpement-applications-mobiles\/risques-de-securite-developpement-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yeeply.com\/fr\/"},{"@type":"ListItem","position":2,"name":"6 risques de s\u00e9curit\u00e9 dans le d\u00e9veloppement Android"}]},{"@type":"WebSite","@id":"https:\/\/yeeply.com\/fr\/#website","url":"https:\/\/yeeply.com\/fr\/","name":"Yeeply","description":"A platform for the development of digital projects","publisher":{"@id":"https:\/\/yeeply.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yeeply.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/yeeply.com\/fr\/#organization","name":"Yeeply","url":"https:\/\/yeeply.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","contentUrl":"https:\/\/yeeply.com\/fr\/wp-content\/uploads\/2019\/05\/logo_yeeply_black@2x.png","width":360,"height":120,"caption":"Yeeply"},"image":{"@id":"https:\/\/yeeply.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YeeplyMobile\/","https:\/\/x.com\/Yeeply_EN","https:\/\/www.linkedin.com\/company\/yeeply"]},{"@type":"Person","@id":"https:\/\/yeeply.com\/fr\/#\/schema\/person\/c7927839158c47143448f3bcdaf7cc14","name":"Yeeply","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f13a8a35567805732422f808376743c5cc1b8918b3dd8f2da231a8306df22006?s=96&d=mm&r=g","caption":"Yeeply"},"url":"https:\/\/yeeply.com\/fr\/author\/yeeply\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Yeeply","author_link":"https:\/\/yeeply.com\/fr\/author\/yeeply\/"},"uagb_comment_info":0,"uagb_excerpt":"&nbsp; \u00c9tant le syst\u00e8me d\u2019exploitation le plus utilis\u00e9 dans le secteur mobile, Android constitue la cible principale des cyber-pirates. Les experts en d\u00e9veloppement Android devraient ...","_links":{"self":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/comments?post=8410"}],"version-history":[{"count":4,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8410\/revisions"}],"predecessor-version":[{"id":17295,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/posts\/8410\/revisions\/17295"}],"wp:attachment":[{"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/media?parent=8410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/categories?post=8410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yeeply.com\/fr\/wp-json\/wp\/v2\/tags?post=8410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}