Of course, these scareware applications are nothing more than malware that hold your PC hostage until you pay the ransom-in most cases, you can't uninstall them or even use the PC.
当然,这些伪安全软件应用程序只不过是恶意软件,它控制你的电脑以此为质直到你支付赎金,并且大多数情况下你无法卸载它们,甚至用不了电脑。
Internet security is a critical issue as threats have evolved from the level of "stupid programmer tricks" to sophisticated malware and even international cyber-warfare.
互联网安全更是一个严重的问题,因为网络上的威胁已经从“愚蠢程序员的小把戏”的程度演化到了高深莫测的黑客软件甚至全球性的网络大战的地步。
This kind of safety can be provided to applications even if their operating system is fundamentally compromised by malware.
即使安装应用程序的操作系统从根本上已经被黑客软件所劫持,此类的安全措施仍能被加载于运用程序上。
Some even waste a piece of custom malware.
有的甚至浪费了一块自定义恶意软件。
What this means is that even if something tries to use Flash to put malware on your computer, the mis-behaving program is stuck inside a virtual sandbox where it can’t get to the rest of your PC.
也就是说,就是有人使用Flash往你电脑上安装了恶意软件,这个不怀好意的程序将被限制在一个虚拟沙箱中,并不能访问你电脑的其他部分。
It's not far-fetched to imagine that in the future attackers could create even harder-to-detect malware-infused slideshows.
我们很自然的就会想到攻击者以后会制作出更难侦测到的注入了恶意软件的幻灯片。
If a malware may once have taken days or even weeks to propagate, it can now reach millions of computers in hours.
如果(过去)一个恶意软件需要数天甚至数周来传播,如今它可以在数小时内传播至上百万台计算机。
Other antivirus products that rely on signature databases and file scanning do not even work in theory to protect against new, mutated, or targeted malware.
其他反病毒产品的依赖于签名数据库和档案扫描甚至不工作的理论,以防止新的,变异,或有针对性的恶意软件。
This can be seen as a safety method to keep the malware stealthy even in case of unknown bugs.
这可以被看作是安全的方法使恶意隐身即使是在案件的未知缺陷。
Some fake apps contain malware that can steal personal information or even lock the phone until the user pays a ransom.
有些伪造应用包含恶意软件,可以偷取使用者的个人信息,甚至把用户的手机锁住,用户需支付一些赎金才能解锁。
Criminals can steal your identity through a variety of ways, including phishing scams, malware on your PC, and even rooting through your trash for sensitive paper documents.
现在罪犯们能够运用多种手段盗取你的身份,包括一系列的诱骗、欺骗,在你的PC机上安装恶意软件,甚至搜查你扔的垃圾来找寻包含敏感信息的纸质文件。
Malware is becoming more difficult to detect, and even harder to remove.
恶意软件的检测变得更加困难,甚至难以消除。
The malware removal should now work even in case of unknown, active malware.
即使是未知的或活动的恶意软件,此恶意软件移除机制仍然可以正常应付。
The malware deletes itself after it executes so you may not find it even on systems that were previously infected.
恶意软件删除后,它本身的执行,因此您可能无法找到它甚至在系统,以前感染。
In the unfortunate event your phone is lost, stolen, infected by mobile malware or even spied on, mobile Security helps to safeguard your personal and confidential data.
如果不幸您的手机遗失,被盗,被移动恶意软件的感染,甚至暗中监视,移动安全帮助保护您的个人和机密资料。
In an even more nefarious plot, an attacker could hijack the auto-update feature on a victim's computer, and trick it into automatically installing malware pulled in from a hacker's Web site.
更加邪恶的阴谋,攻击者可以劫持的自动更新功能在受害者的计算机上,并诱骗到自动安装恶意软件的退出,从黑客的网站。
Please note that even old programs can get infected or replaced by malware without your knowledge. Besides that trustworthy sources might have become compromised themselves.
请注意即使是旧的程序一样可以被病毒感染或调换在您不知道的情况下。除此之外可信赖的资源可能变为威胁。(这话怎么读着这么别扭…)
The "implicit" whitelist stops even the most sophisticated malware attacks without the management overhead or productivity disruption required by centralized whitelist signature approaches.
该“隐式”白名单能够阻止最精细的恶心软件的攻击,而无需中央集中白名单信号要求额外管理费或是中断程。
Even with all those detections, there could be even more unwanted malware going undetected on users' computers, according to researcher Doug Camplejohn, CEO of security firm Mi5 Networks.
甚至与所有这些侦测,则有可能更不受欢迎的恶意软件去未被发现的用户计算机上,根据研究员道格·卡普·雷杰恩,总裁兼首席执行官保安公司的MI5网络。
Even with all those detections, there could be even more unwanted malware going undetected on users' computers, according to researcher Doug Camplejohn, CEO of security firm Mi5 Networks.
甚至与所有这些侦测,则有可能更不受欢迎的恶意软件去未被发现的用户计算机上,根据研究员道格·卡普·雷杰恩,总裁兼首席执行官保安公司的MI5网络。
应用推荐