Attacks can result in problems ranging from identity theft for one user to incursions that involve major financial and security issues for millions of consumers and businesses.
这类攻击导致很多的问题,从单个用户的身份窃取到涉及数百万消费者和经营者的重要金融和安全问题。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
You should always at least have a server certificate (otherwise the connection would be vulnerable to MITM attacks). This proves the identity of the server to the client.
你应该至少有一个服务器证书(否则将脆弱的连接MITM攻击)。这证明了服务器到客户机的身份。
And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children's information.
今晚,我敦促国会通过这项议案,我们需要这项议案来更好地应对与日俱增的网络袭击威胁,抗击身份盗窃,保护孩子们的信息。
Such tests are essential protections against attacks on the Internet, such as identity theft.
这样的检验在对付互联网上的攻击,例如:身份盗窃时必不可少。
These attacks appear to target cherished symbols of Amish identity.
这种袭击显然是针对门诺教观念所珍视的象征物。
By using the high order differential state sequence, the casuality of the system and the capability of resistance to identity deception and differential attacks is enhanced.
使用高阶差分状态序列,增强了系统因果强度,加强了抵抗身份欺骗和差分分析攻击的能力。
Three attacks on Yu Gang et al's scheme to show that their forward secure proxy-signcryption scheme based on identity is insecure.
给出了三种攻击并指出于刚等人提出的前向安全的基于身份的代理签密方案是不安全的。
Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。
And tonight, I urge this Congress to finally pass the legislation we need to better meet the evolving threat of cyber-attacks, combat identity theft, and protect our children's information.
今晚,我敦促国会通过这项议案,我们需要这项议案来更好地应对与日俱增的网络袭击威胁,抗击身份盗窃,保护孩子们的信息。
Identity theft fraudsters will trawl through sites which allow people to leave their pictures and personal details, finding targets for "phishing" attacks?
身份盗窃黑客将从允许人们上传照片和个人资料的网站上搜索个人信息,确定实施“网络钓鱼”的目标。
Identity theft fraudsters will trawl through sites which allow people to leave their pictures and personal details, finding targets for "phishing" attacks?
身份盗窃黑客将从允许人们上传照片和个人资料的网站上搜索个人信息,确定实施“网络钓鱼”的目标。
应用推荐