{"id":11275,"date":"2018-05-10T11:20:29","date_gmt":"2018-05-10T18:20:29","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=11275"},"modified":"2026-03-23T06:41:21","modified_gmt":"2026-03-23T13:41:21","slug":"envoyer-des-messages-dalerte-de-securite-par-courrier-electronique-a-partir-des-contacts","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/email-security-alert-messages-from-contacts\/","title":{"rendered":"Email Security Alert: Messages from Contacts"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><em>Par Chris Rosa, gourou informatique de DriveSavers<\/em><\/p>\n<p>M\u00e9fiez-vous des messages apparemment l\u00e9gitimes contenant des pi\u00e8ces jointes.<\/p>\n<h2>Contact connu ?<\/h2>\n<p>Dans l'exemple concret ci-dessous, Pamela a re\u00e7u une r\u00e9ponse \u00e0 un message qu'elle avait envoy\u00e9 \u00e0 un vendeur plus t\u00f4t dans la semaine. Dans la r\u00e9ponse, on lui demande de cliquer sur une pi\u00e8ce jointe.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-45927\" src=\"\/wp-content\/uploads\/2018\/05\/contacts-scam.jpg\" alt=\"\" width=\"500\" height=\"658\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/contacts-scam.jpg 500w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/contacts-scam-228x300.jpg 228w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><br \/>\nIl s'av\u00e8re que l'exp\u00e9diteur, Jason, a un ordinateur compromis. Le virus\/programme malveillant parcourait activement son courrier \u00e9lectronique et r\u00e9pondait aux messages contenant cette pi\u00e8ce jointe infect\u00e9e.<\/p>\n<p>Si Pamela ouvrait ce document Word, il demanderait \u00e0 ce que les macros soient activ\u00e9es, etc.<\/p>\n<h2>Comment se prot\u00e9ger<\/h2>\n<p>Que pouvez-vous faire pour vous prot\u00e9ger des logiciels malveillants qui vous sont envoy\u00e9s par un contact connu ? Eh bien... c'est difficile, pour \u00eatre honn\u00eate.<\/p>\n<p>Ce virus est suffisamment r\u00e9cent pour n'\u00eatre d\u00e9tect\u00e9 par aucune des d\u00e9fenses bas\u00e9es sur les serveurs ou les clients. Les mesures pr\u00e9ventives habituelles n'ayant pas fonctionn\u00e9, il vous appartient de faire preuve d'une grande prudence \u00e0 l'\u00e9gard des pi\u00e8ces jointes Microsoft (MS) Office qui vous sont envoy\u00e9es par courrier \u00e9lectronique.<\/p>\n<p>D'une part, <strong>ne jamais activer les macros<\/strong> si n\u00e9cessaire pour visualiser un document.<\/p>\n<p>En outre, il peut \u00eatre utile d'utiliser une messagerie \u00e9lectronique en ligne comme Gmail plut\u00f4t qu'un client de messagerie natif comme Outlook ou Apple Mail. Gmail dispose d'une visionneuse de pi\u00e8ces jointes int\u00e9gr\u00e9e qui vous permet de v\u00e9rifier un fichier avant de le t\u00e9l\u00e9charger. Voici \u00e0 quoi ressemble ce fichier dans cette visionneuse :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-45929\" src=\"\/wp-content\/uploads\/2018\/05\/office-preview-gmail.jpg\" alt=\"\" width=\"700\" height=\"505\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/office-preview-gmail.jpg 700w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/office-preview-gmail-300x216.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Comment les courriels sont-ils infect\u00e9s ?<\/h2>\n<p>Comment le courrier \u00e9lectronique de Jason a-t-il \u00e9t\u00e9 infect\u00e9 par ce virus qui envoie maintenant des courriels \u00e0 tous ses contacts ? Probablement de la m\u00eame mani\u00e8re que Pamela a \u00e9t\u00e9 cibl\u00e9e. Il est probable que Jason ait re\u00e7u une r\u00e9ponse \u00e0 un courriel qu'il avait pr\u00e9c\u00e9demment envoy\u00e9 \u00e0 l'un de ses contacts et que, pensant qu'il s'agissait du contact qui lui envoyait l\u00e9gitimement un document \u00e0 ouvrir, il ait innocemment ouvert la pi\u00e8ce jointe et t\u00e9l\u00e9charg\u00e9 le virus.<\/p>\n<h2>Quel est l'objectif du virus ?<\/h2>\n<p>Il est \u00e9vident que ce virus n'a pas pour seule raison d'\u00eatre d'ennuyer les gens avec de faux courriels.<\/p>\n<p>Il existe de nombreuses possibilit\u00e9s pour expliquer la cr\u00e9ation de ce virus. Une fois qu'il est ouvert par un destinataire, il d\u00e9tourne d\u00e9finitivement le courrier \u00e9lectronique de cette personne et envoie des copies de lui-m\u00eame \u00e0 tous les contacts qu'il y trouve. En outre, il peut \u00eatre programm\u00e9 pour effectuer l'une des actions suivantes, voire plus :<\/p>\n<ul>\n<li>R\u00e9colte d'informations personnelles : collecte d'informations sur les cartes de cr\u00e9dit, les comptes bancaires, les identifiants et les mots de passe.<\/li>\n<li>Installer un ransomware : crypter les donn\u00e9es d'un ordinateur et exiger un paiement pour restituer les donn\u00e9es \u00e0 leur propri\u00e9taire.<\/li>\n<li>Installer un terminal d'acc\u00e8s \u00e0 distance (RAT) que le pirate peut utiliser pour prendre le contr\u00f4le de l'ordinateur de la victime.<\/li>\n<\/ul>\n<h2>Comment savoir si vous avez t\u00e9l\u00e9charg\u00e9 un virus ?<\/h2>\n<p>L'objectif, bien s\u00fbr, est de ne pas t\u00e9l\u00e9charger de virus en premier lieu. Cependant, comme le montre l'exemple ci-dessus, il est souvent difficile de savoir qu'il ne faut pas cliquer sur un fichier ou l'ouvrir. M\u00eame apr\u00e8s avoir ouvert une pi\u00e8ce jointe contenant un logiciel malveillant (virus), il n'est pas toujours \u00e9vident de savoir que l'on a t\u00e9l\u00e9charg\u00e9 quelque chose de nuisible.<\/p>\n<p>Lorsque vous cliquez sur une pi\u00e8ce jointe malveillante, celle-ci vous demandera probablement d'activer les macros et peut ressembler \u00e0 l'exemple de Pamela ci-dessus. Toute demande d'activation de macros est une indication assez certaine de l'existence d'un logiciel malveillant.<\/p>\n<p>Les sympt\u00f4mes indiquant que vous avez t\u00e9l\u00e9charg\u00e9 quelque chose que vous n'auriez pas d\u00fb t\u00e9l\u00e9charger peuvent \u00eatre les suivants :<\/p>\n<ul>\n<li>Votre ordinateur est lent<\/li>\n<li>Vous n'avez pas le droit d'aller sur Internet<\/li>\n<li>Votre ordinateur peut ne pas d\u00e9marrer<\/li>\n<li>Messages inconnus dans votre dossier d'envoi<\/li>\n<\/ul>\n<h2>Que faire si votre ordinateur est infect\u00e9 ?<\/h2>\n<h3>1) D\u00e9connecter<\/h3>\n<p>D\u00e9connectez-vous imm\u00e9diatement de tout r\u00e9seau ou autre dispositif, comme les connexions c\u00e2bl\u00e9es, les disques de sauvegarde attach\u00e9s, les imprimantes, les r\u00e9seaux Wifi partag\u00e9s ou toute autre connexion possible. Ceci est particuli\u00e8rement important si cela se produit au travail o\u00f9 votre ordinateur est connect\u00e9 au r\u00e9seau de l'entreprise !<\/p>\n<h3>2) Fermer tous les programmes<\/h3>\n<p>En fermant les programmes, il sera plus difficile pour un virus de recueillir les informations stock\u00e9es par ces programmes. Quoi qu'il en soit, ne saisissez aucun nom d'utilisateur ou mot de passe pour quelque raison que ce soit, car ils pourraient \u00eatre collect\u00e9s et utilis\u00e9s par le logiciel malveillant.<\/p>\n<h3>3) Contacter le service informatique ou le service d'assistance<\/h3>\n<p>S'il ne s'agit pas d'un ordinateur d'entreprise, ignorez cette \u00e9tape et passez \u00e0 l'\u00e9tape 4.<\/p>\n<p>Le personnel du service informatique ou du service d'assistance de votre entreprise sait comment g\u00e9rer un probl\u00e8me de virus. Si cela se produit au travail, contactez-les imm\u00e9diatement (mais pas en leur envoyant un courrier \u00e9lectronique depuis l'ordinateur infect\u00e9). Laissez les professionnels s'en charger.<\/p>\n<h3>4) Sauvegarde<\/h3>\n<p>S'il s'agit de votre ordinateur personnel et que vous n'\u00eates pas pr\u00eat \u00e0 vous adresser directement \u00e0 un professionnel, commencez par sauvegarder votre ordinateur sur un nouveau disque de sauvegarde. Ne sauvegardez pas sur un disque qui contient d\u00e9j\u00e0 des donn\u00e9es importantes, car le virus pourrait migrer de votre ordinateur vers le p\u00e9riph\u00e9rique.<\/p>\n<h3>5) Utiliser un logiciel antivirus<\/h3>\n<p>De nombreux logiciels antivirus peuvent \u00eatre t\u00e9l\u00e9charg\u00e9s en ligne. Connectez votre ordinateur \u00e0 un r\u00e9seau Wifi qui n'est pas utilis\u00e9 par d'autres appareils, faites des recherches pour trouver une bonne option (assurez-vous de lire les commentaires sur des sites qui n'appartiennent pas \u00e0 l'\u00e9diteur du logiciel) et, une fois que vous avez fait votre choix, achetez et t\u00e9l\u00e9chargez le logiciel. Le logiciel antivirus doit \u00eatre accompagn\u00e9 d'instructions faciles \u00e0 suivre.<\/p>\n<p>Une autre solution consiste \u00e0 t\u00e9l\u00e9charger le logiciel sur un autre ordinateur et \u00e0 utiliser une cl\u00e9 USB pour le transf\u00e9rer de l'ordinateur non infect\u00e9 \u00e0 l'ordinateur infect\u00e9. Vous pouvez \u00e9galement vous rendre dans un magasin d'informatique tel que Best Buy ou Fry's et acheter un logiciel antivirus qui peut \u00eatre install\u00e9 \u00e0 partir d'un disque.<\/p>\n<h3>6) Il est temps de faire appel \u00e0 un professionnel<\/h3>\n<p>Si le logiciel antivirus ne d\u00e9barrasse pas votre ordinateur du virus, il est temps d'appeler un professionnel.<\/p>\n<h2>Prot\u00e9gez-vous<\/h2>\n<p>Il faut toujours se m\u00e9fier<\/p>\n<ul>\n<li>Ouvrir un courriel d'une personne inconnue<\/li>\n<li>Ouvrir des pi\u00e8ces jointes inattendues, m\u00eame si elles semblent provenir d'une personne que vous connaissez.<\/li>\n<li>Cliquer sur des liens<\/li>\n<\/ul>\n<p>Si le message semble provenir d'une personne que vous connaissez mais que vous ne vous y attendiez pas, posez-lui la question. Appelez-la, envoyez-lui un SMS ou un courriel pour lui demander si elle vous a envoy\u00e9 une pi\u00e8ce jointe ou un lien \u00e0 ouvrir. Si c'est le cas, la personne devrait comprendre que vous \u00eates simplement prudent. Si ce n'est pas le cas, c'est une bonne chose d'avoir demand\u00e9 !<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"By Chris Rosa, DriveSavers IT Guru Be on the lookout for seemingly legitimate messages with attachments. Known Contact? In the real-life example below, Pamela received a reply to a message she had sent to a vendor earlier in the week. In the reply, she is asked to click on an attachment. As it turns out,&hellip;","protected":false},"author":30,"featured_media":45925,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[190],"post_series":[],"class_list":["post-11275","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Receiving spam email from my contacts?<\/title>\n<meta name=\"description\" content=\"Be on the lookout for seemingly legitimate messages with attachments. Learn how to protect yourself and your friends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/envoyer-des-messages-dalerte-de-securite-par-courrier-electronique-a-partir-des-contacts\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Security Alert: Messages from Contacts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/envoyer-des-messages-dalerte-de-securite-par-courrier-electronique-a-partir-des-contacts\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-10T18:20:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T13:41:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"Email Security Alert: Messages from Contacts\",\"datePublished\":\"2018-05-10T18:20:29+00:00\",\"dateModified\":\"2026-03-23T13:41:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/\"},\"wordCount\":1028,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/email-scaled.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/\",\"name\":\"Receiving spam email from my contacts?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/email-scaled.jpg\",\"datePublished\":\"2018-05-10T18:20:29+00:00\",\"dateModified\":\"2026-03-23T13:41:21+00:00\",\"description\":\"Be on the lookout for seemingly legitimate messages with attachments. Learn how to protect yourself and your friends.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/email-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/email-scaled.jpg\",\"width\":2000,\"height\":1000,\"caption\":\"Email from contact\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/email-security-alert-messages-from-contacts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"DriveSavers\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Security Alert: Messages from Contacts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/fr-fr\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Receiving spam email from my contacts?","description":"Be on the lookout for seemingly legitimate messages with attachments. Learn how to protect yourself and your friends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/envoyer-des-messages-dalerte-de-securite-par-courrier-electronique-a-partir-des-contacts\/","og_locale":"fr_FR","og_type":"article","og_title":"Email Security Alert: Messages from Contacts","og_url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/envoyer-des-messages-dalerte-de-securite-par-courrier-electronique-a-partir-des-contacts\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2018-05-10T18:20:29+00:00","article_modified_time":"2026-03-23T13:41:21+00:00","og_image":[{"width":2000,"height":1000,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u00c9crit par":"Michelle West","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"Email Security Alert: Messages from Contacts","datePublished":"2018-05-10T18:20:29+00:00","dateModified":"2026-03-23T13:41:21+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/"},"wordCount":1028,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg","keywords":["cybersecurity"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/","name":"Receiving spam email from my contacts?","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg","datePublished":"2018-05-10T18:20:29+00:00","dateModified":"2026-03-23T13:41:21+00:00","description":"Be on the lookout for seemingly legitimate messages with attachments. Learn how to protect yourself and your friends.","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/05\/email-scaled.jpg","width":2000,"height":1000,"caption":"Email from contact"},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/email-security-alert-messages-from-contacts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"DriveSavers","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Email Security Alert: Messages from Contacts"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"Services de r\u00e9cup\u00e9ration de donn\u00e9es DriveSavers","description":"Le leader mondial de la r\u00e9cup\u00e9ration de donn\u00e9es","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers R\u00e9cup\u00e9ration de Donn\u00e9es","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Ecrire sur DriveSavers, la r\u00e9cup\u00e9ration de donn\u00e9es, ou un autre sujet li\u00e9 \u00e0 la technologie ? Contactez nous.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=11275"}],"version-history":[{"count":1,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11275\/revisions"}],"predecessor-version":[{"id":83479,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/11275\/revisions\/83479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media\/45925"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=11275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=11275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=11275"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/post_series?post=11275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}