网络犯罪分子可以钻空秘密地改换网络信息流向,使用户原本键入某银行网址的信息被悄悄送进了一个假网址,以致用户名和密码被盗。
It could allow a criminal to redirect Web traffic secretly, so that a person typing a bank's actual Web address would be sent to a fake site set up to steal the user's name and password.
同时,网络犯罪分子盯上了社交网站,投放越来越多的恶意软件、实施网络诈骗,将这个日益壮大的用户基础当作完善诈骗技巧的试验田。
At the same time, cyber criminals are targeting social network sites with increasing amounts of malware and online scams, honing in on this growing user base.
然后,黑客们将这些数据卖给了另一群在网络阴暗角落里活动的犯罪分子。
Hackers then sold the data to a second group of criminals operating in shadowy corners of the web.
为什么任何人都觉得犯罪分子不会使用同一个系统来盗取银行账户和信用卡信息,利用它发动其它攻击或者将它变成巨大的垃圾邮件发放网络?
Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?
犯罪分子可以利用计算机网络攻击他人计算机系统、软件、发送垃圾邮件或是窃取资料。
They can be used to attack other systems, host attack tools, send spam, or just steal data.
他表示,在过去没有指导方向一直给犯罪分子提供了可乘之机,同时阻滞了对不断增加的高科技网络侵袭进行协调反击。
He said the lack of direction was giving the initiative to criminals and hampering co-ordinated responses to the growing number of hi-tech attacks.
每年,各大企业都要投入巨额资金下令各部门相关员工维护软件系统的安全,从而使犯罪分子的网络犯罪计划从一开始就落空。
Every year, companies spend vast sums getting software security staff to incidents at a branch office before they can even start investigating computer crimes.
每年,各大企业都要投入巨额资金下令各部门相关员工维护软件系统的安全,从而使犯罪分子的网络犯罪计划从一开始就落空。
Every year, companies spend vast sums getting software security staff to incidents at a branch office before they can even start investigating computer crimes.
应用推荐