• The typical stuff we're seeing, though, right now: the colored background noise, phishing attacks.

    不过我们目前看到典型情况是有色背景噪音网络钓鱼攻击

    youdao

  • In recent years, phishing attacks have repeatedly occurred in China and the situation is intensifying.

    近几年中国屡次发生网络钓鱼攻击的案件,而且形势愈演愈烈。

    youdao

  • Approximately 53 percent of reported incidents in 2010 were phishing attacks. The breakdown on reports to us-cert.

    2010年,53%事件报告钓鱼攻击

    youdao

  • New error pages provide a simplified user experience which helps to mitigate social-engineering and phishing attacks.

    新的错误页面提供了一个简单用户体验帮助用户减少社会工程学仿冒网站攻击

    youdao

  • This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.

    可能意味着记录所有DNS查询-钓鱼攻击追捕可疑流量趋势也是有益的。

    youdao

  • This was a great improvement in security intended to reduce phishing attacks and other password weaknesses, but on its own, it benefits only Google Apps users.

    安全的一改善目的减少钓鱼攻击其他密码软肋本身来说,只是让Google应用用户受惠

    youdao

  • Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.

    钓鱼攻击网上很常见常常是以收到看似合法电子邮件开始,邮件中含有逼真网站(常常银行电子邮件供应商)的链接

    youdao

  • Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.

    招聘网站频频受到黑客攻击,或遭受通过电子邮件网络钓鱼”的攻击因为它们那些对身份盗窃感兴趣的人提供丰富数据资源

    youdao

  • In the same way, browser security helps protect you from malware, phishing, and other online attacks, while privacy features help keep your browsing private on your computer.

    同样道理,浏览器安全保障让远离恶意软件网络钓鱼以及其他网络攻击隐私保护功能保护个人计算机的浏览隐私

    youdao

  • Strong passwords do nothing to protect online users from password stealing attacks such as phishing and keylogging, and yet they place considerable burden on users.

    网民来说,密码对于诸如钓鱼攻击键盘记录之类的密码盗窃手段毫无防御能力。 相反,强密码网民带来相当大负担

    youdao

  • What exactly are phishing and malware attacks?

    那么,网络钓鱼恶意软件攻击究竟什么?

    youdao

  • Some 51, 000 'phishing' attacks were recorded last year, up 16 per cent on the previous year.

    记录结果显示,去年约有五万一千个“网络钓鱼攻击较前年相比上升了16%。

    youdao

  • Users need to use good judgement when giving out information, and be educated about possible phishing schemes and other social engineering attacks.

    用户给出信息应该进行良好判断并且接受可能的网页仿冒方式以及一些社会工程攻击的培训。

    youdao

  • Compromised computers are sometimes used to further other scams, such as "phishing" attacks that try to persuade users to reveal sensitive information such as bank passwords.

    有时受侵电脑会被进一步用于其他欺诈活动例如网络钓鱼攻击这种攻击往往会说服用户透露银行密码敏感信息

    youdao

  • Computer security specialist says spear phishing often provides the means for even broader attacks.

    电脑安全专家称为鱼叉式网络钓鱼常常更深攻击提供指导。

    youdao

  • It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.

    保护公共密钥不能篡改,从而防止网络欺诈欺骗篡改代码的攻击。

    youdao

  • Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.

    目前的很多黑客攻击手段钓鱼攻击、SQL注入攻击等各种网络攻击方式都是身份认证开始的。

    youdao

  • Identity theft fraudsters will trawl through sites which allow people to leave their pictures and personal details, finding targets for "phishing" attacks?

    身份盗窃黑客允许人们上传照片个人资料的网站搜索个人信息,确定实施“网络钓鱼”的目标

    youdao

  • Utility employees are vulnerable to relatively low-tech "phishing" attacks that rely on "social engineering" to trick people into revealing sensitive information.

    公用事业单位的员工极易受到技术含量相对较低的“网络钓鱼攻击这些攻击基于社会工程学”,能够诱骗人们泄露敏感信息。 。

    youdao

  • The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.

    这个安全漏洞似乎影响到所有咨询网页可以使用个人发布恶意软件,进行钓鱼各种不同恶意攻击

    youdao

  • Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    youdao

  • Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络、网络嗅探网址嫁接

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定