Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?
恐怖份子与黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?
That makes it easier for hackers to create applications that surreptitiously spy on users or access phone functions without permission.
这就使得黑客能更轻易的通过恶意软件暗中盗取用户信息或使用手机功能。
The owner of the software used by the hacker or hackers to protect their identity said that he believed it would be possible to identify the culprit.
黑客为隐藏身份而使用了某软件,该软件的开发者表示,有希望查清这次犯罪行为。
But we all know that hackers would beat the system anyway, and which one do you think is more stable: third-party development with official support or without?
但谁都知道黑客们总能撬开你的系统的,那么你说有官方支持的第三方软件开发和没有官方支持的哪个更稳定?
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Hackers who access the network will have the ability to turn off alarm systems and lights, leaving the home vulnerable to a break-in, or the theft could be more electronic.
黑客们会通过网络关掉你的自动警报系统或者照明系统,你的家就会很容易地被侵入,使电子盗窃也变得很容易。
But rarely have hackers breached a bank itself rather than the partners or retail outlets that often store large caches of those card Numbers.
但黑客很少会直接攻击银行系统,而是更倾向于袭击那些存储大量信用卡号码的合作伙伴或零售商。
But not completely as, there are still many companies who hire hackers to analysis the weaknesses or the strength of their own systems.
但是也不全是,仍有许多公司雇佣黑客来分析他们自己的系统的优缺点。
If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.
如果用户的证书丢失或被盗,黑客就能够访问信息而不用经过身份验证。
Fortunately, such a scenario is likely to remain science fiction. But smart systems might be vulnerable to malfunctioning or attacks by hackers.
幸运的是,这一幕或许仍然只是科幻小说中的情节,不过智能系统的确很容易瘫痪或是被黑客侵袭。
This feature prevents hackers from changing the MAC address of their machine or from trying to map more than one MAC address to their machine.
这个功能会阻止黑客改变他机器的MAC地址或试图映射多个MAC地址到他的机器上。
While experts ferret out software flaws to fix them and protect users, hackers use the same information to devise pranks or commit crimes.
就在专家们找出需要修复的软件漏洞以保护用户之时,黑客们却利用了这些相同的信息去搞恶作剧或进行一些犯罪活动。
The sudden growth in the number of hackers in not necessarily down to schools improving their computing classes or an increased diligence on the part of young IT enthusiasts.
黑客数量的突然增加并不是因为学校增开了计算机课程,也不是因为少年IT发烧友智力突飞猛进。
In retrospect the tipoff to the bank that something was awry was that the hackers used an Internet protocol, or IP, address that the Shames-Yeakels had never used before.
银行回顾这一偷盗过程时,发现蹊跷的地方在于,黑客使用了山姆斯·伊克尔一家从未使用过的因特网协议(又称IP)地址。
Since banks have started watching out for transfer requests from unknown computers, hackers have in the past year or so begun hijacking their victims' own IP addresses.
由于银行开始严密监视从未知电脑处发出的转账申请,黑客大约从前年开始劫持受害者的IP地址。
The point of all this work is to make it so difficult to get at sensitive data that hackers don't even try, or they move on after a few failed attempts.
加密的要点是使获取敏感数据变得非常困难,以致黑客不再尝试攻击,或尝试攻击失败后离去。
Using information from these ethical hackers, manufacturers can remedy or "patch" the problem before its release and companies can take measures to safeguard their data.
通过这些道德性极高的黑客所提供的信息,制造商会在危机发生之前就把所存在的问题解决,相关的公司也会采取必要的措施保护好自己的数据。
Chances are, you're a customer of one of these 2,500 companies and it's possible that your email or name has fallen into the hands of hackers.
很可能你就是这2500家公司之一的一名客户,你的电子邮件或姓名可能已经落入黑客之手。
Though hackers are often characterized as reckless cyber outlaws, Coleman noted that many aren't out to steal credit card information or crash computer servers.
尽管黑客经常被定型为毫无顾忌游走于法律之外的人,Coleman指出,其中很多不会盗取信用卡信息或者让服务器宕掉。
The hackers got into the computers in one of two ways, either through their public websites or through infected emails sent to company executives.
黑客通过其公共网站或通过发送到公司高管、受感染的电子邮件的两种方法之一进入到计算机。
These would be needed, for example, if hackers took control of nuclear facilities, or were about to open the Hoover dam.
例如当骇客控制了核设施,或者准备开闸胡佛大坝,这些权利还是需要的。
Hackers have moved their attention past traditional targets, perhaps due to the inevitable maturity of those platforms, or perhaps because they are now simply passe.
黑客们不再关注传统的目标,可能是由于这些平台已经比较成熟,也可能是因为它们现在已经过时了。
Port probing by hackers is usually an attempt to execute malicious code on a server or to take control of the server by looking for vulnerable ports.
黑客进行的端口探测通常是尝试在服务器上执行恶意代码或者通过寻找易攻击的端口来控制服务器。
The hackers then used those login details to forward all mail coming into the account to a third party, or in some cases gathered information about contacts to use in other phishing scams.
接着,黑客会利用盗取的信息入侵受害人的账户,将其所有的来信转发到第三方邮箱,或者收集受害人的联系人信息用于其他网络钓鱼活动。
Expert computer hackers, called crackers, might break into or overload military computers and networks, or spread computer viruses.
专家级电脑黑客,称作狂乱,可以闯入、超载其军用计算机和网络,散布电脑病毒。
But smart systems might be vulnerable to malfunctioning or attacks by hackers.
智能系统,反而在故障面前极度脆弱,而且很容易受黑客攻击。
But smart systems might be vulnerable to malfunctioning or attacks by hackers.
智能系统,反而在故障面前极度脆弱,而且很容易受黑客攻击。
应用推荐