识别特定的恶意邮件发送者。
那个引起大家注意此事的拉比受到恶意邮件。
这种恶意邮件伪装有关成员工解雇的文档并被公司的垃圾邮件过滤器捕获。
The offending email purported to be a document about staff hiring issues and had been caught by the company's spam filter.
垃圾邮件占全球电子邮件总量的近三分之二(65%),其中8% 到10%被视为恶意邮件。
Spam accounts for nearly 2\/3 of global email (65%), of which between 8% and 10% are considered malicious messages.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
在本方案中,当用户执行邮件消息中的恶意链接时,就会不知不觉地执行攻击者编写的脚本。
In this scenario, the user unknowingly executes scripts written by an attacker when they follow a malicious link in a mail message.
邮件包含了一份PDF文件企图安装一个名为“有毒常春藤”的恶意程序以便入侵者能完全控制受害人的电脑。
The e-mail contained a PDF file that was intended to install a malicious software program known as Poison Ivy, which was meant to give an intruder complete control of the victim's computer.
即使被人否定、失去朋友、关系破裂、受到陌生人恶意非难的邮件,我也不会改变我要走的路。
Even with all the negativity, the loss of friends, the damaged relationships, the harsh and critical emails from total strangers, I wouldn't trade my path for anything.
而当你发送电子邮件回家,部分或所有这些恶意软件可能已经转移到你家里的主服务器上了,这是真的。
And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.
而当你在家发送电子邮件的时候,这些恶意软件中的一部分或者全部都已经转移到国内服务器上了。
And when you emailed back home, some or all of the malware may have migrated to your home server.
我们也同意这点,但是我们也要指出许多钓鱼攻击和恶意软件仍然是通过邮件传播的。
We would agree with this, but we would also point out that a lot of these scams and malware attacks still arrive by email.
这项研究跟踪了一个钓鱼程序。 这个钓鱼程序通过电子邮件传播,一旦打开,自动从互联网下载某个隐藏的恶意软件。
The study traced the spread of one particular spying malware, usually spread by a "phishing" email which, if opened, downloaded a hidden programme on to the computer network.
而恶意软件们也追随着他们迁移——从电子邮件到社会化网络网站。
And malware threats have followed them - from email to social networking sites.
网络安全公司赛门铁克的统计显示,全球垃圾邮件的数量已占据电子邮件总量的86%,其中“携毒邮件”或包含恶意软件的邮件占垃圾邮件总数的4.5%。
Worldwide spam now makes up 86% of all emails and "toxic" spam or spam that contains malware accounts for 4.5% of all spam, said the Internet security firm Symantec.
网站现在成了受黑客青睐的传播恶意软件的工具,部分原因是通过社交媒体网站发送垃圾邮件或链接可以让计算机神不知鬼不觉地被感染。
Websites are now the favoured means of spreading malware, partly because the unwary are directed to them through spam or links posted on social-networking sites.
创建一个收件箱规则,潜在的恶意电子邮件垃圾邮件文件夹。
Create an Inbox rule that moves potentially malicious email to the Junk mail folder.
这种邮件事实上包含有一个Excel表格,一旦打开,雇员的计算机就会被装上恶意软件,并且从那里传播到公司内部的其它计算机上去。
The e-mail actually contained an Excel document that, once opened, installed malware on the employee's computer and from there spread to other computers within the company.
不过,他也表达了对中国今年估计将出现约8亿恶意软件和电子邮件的担忧。
But he expressed concern about estimates that China would see about 800 million malignant software and emails this year.
垃圾邮件的投放,也是恶意软件的功劳。
Of rubbish mail put in, also be the contribution of baleful software.
Conficker程序被设计为了在它占据被感染的计算机后,它能被软件远程控制为一个用于分发广告邮件或其它恶意程序的广域系统服务。
The Conficker program is built so that after it takes up residence on infected computers, it can be programmed remotely by software to serve as a vast system for distributing spam or other malware.
Gawker戏剧性地写道,11.4万多名受害者“可能会收到大量的营销垃圾邮件和恶意黑客骚扰”。
Gawker melodramatically wrote that the 114, 000-plus victims "could be vulnerable to spam marketing and malicious hacking."
由于电脑中垃圾邮件泛滥而导致与其相联的网络摄像头,电视机甚至冰箱被恶意操控的事件已经出现过。
There have already been instances of nefarious types taking control of webcams, televisions and even a fridge, which was roped into a network of computers pumping out email spam.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
另外,恶意软件可以被安装到PC以劫持它,并用它来转播垃圾邮件。
Additionally, malicious software could be installed on a PC to hijack it and use it to relay spam.
通过控制一台机器,入侵者在一封邮件中植入包含恶意软件的附件引诱第二名受害者打开。
After taking over one computer, intruders insert into ane-mail conversation a message containing a digital attachment carrying malware that is highly likely to be opened by the second victim.
网上经理通常是这样一个人:他避免发生冲突,躲藏在电子邮件后面并把它作为一种进攻的武器,结果反而带来恶意,还有效率低下。
The virtual manager generally is a conflict-avoiding character who hides behind email and USES it as an instrument of aggression, creating not only ill will but inefficiencies as well.
网上经理通常是这样一个人:他避免发生冲突,躲藏在电子邮件后面并把它作为一种进攻的武器,结果反而带来恶意,还有效率低下。
The virtual manager generally is a conflict-avoiding character who hides behind email and USES it as an instrument of aggression, creating not only ill will but inefficiencies as well.
应用推荐