• Many Internet security experts consider the first virus attack on the PC to have occurred in 1986.

    CNN: Facebook, Twitter crooks just a click away

  • That is when the virus releases its attack, spreading when the dead skin cells flake off the body naturally.

    FORBES: Cornering A Killer

  • They work indirectly by revving up various bodily defense mechanisms to attack the virus.

    FORBES: Stealth Killer

  • While no cure yet exists for AIDS, treatments are starting to attack the virus in different ways.

    ECONOMIST: The menace of AIDS | The

  • And Hazuda thinks there may be other ways to attack the virus too.

    FORBES: Innovation

  • And that, of course, opens up another route to attack the virus.

    ECONOMIST: An ounce of prevention . . . | The

  • Existing hep C treatments, based on bioengineered versions of the natural immune system protein alpha interferon, attack the virus indirectly and work half the time, at best, for the most common strain.

    FORBES: Viral Vertigo

  • The drugs aim either to boost immune response or to attack and inactivate the viral enzymes that hepatitis C uses to replicate, in much the same way that AIDS drugs attack that virus.

    FORBES: Stealth Killer

  • Seeing the innocuous virus, the immune system creates attack cells that should, in theory, fight off HIV.

    FORBES: Magazine Article

  • Computer systems at energy firm RasGas have been taken offline by a computer virus only days after a similar attack on oil giant Aramco.

    BBC: Computer virus hits second energy firm

  • Against an attack minus fast bowler Simon Jones (virus) and spinner Gareth Batty (calf), the Worcestershire openers set off at a high tempo, with Carl Greenidge conceding 32 runs from two overs with the new ball.

    BBC: Hick knock sinks Gloucestershire

  • No doubt the virus-writers and hackers will find new ways to attack these novel defence mechanisms, just as micro-organisms can evolve their way around immune responses.

    ECONOMIST: A thousand ills require a thousand cures

  • In general, the signature-based security products used to defend enterprise networks, such as firewalls, anti-virus products and intrusion detection systems are increasingly blind to modern attack methods, which are increasingly embedded into application data or designed to self-mutate in order to evade detection.

    FORBES: Cyberwar Or Not Cyberwar? And Why That Is The Question

  • These vaccines resemble those used against smallpox or polio in that they use a piece of the target -- there a virus, here a cancer cell -- to boost the immune systems ability to find and attack those targets.

    FORBES: In search of antigens

  • Instead of being a targeted cyberwarfare attack, this malware is simply a run-of-the-mill trojan virus that travels by "sneakernet, " the tongue-in-cheek name for the transmission of viruses across unconnected computers by hand (or foot) in the days before widespread Internet connectivity.

    FORBES: Magazine Article

  • That launches another wave of viral destruction that pushes HIV to mutate yet again, prompting another immune attack, and so on, until eventually the body isn't able to keep up with the virus and pushes out poor, or no more additional antibodies that can neutralize HIV.

    CNN: Possible step toward AIDS vaccine development

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定