The typical stuff we're seeing, though, right now: the colored background noise, phishing attacks.
不过我们目前看到的典型情况是:有色背景噪音,网络钓鱼攻击。
In recent years, phishing attacks have repeatedly occurred in China and the situation is intensifying.
近几年,中国也屡次发生网络钓鱼攻击的案件,而且形势愈演愈烈。
Approximately 53 percent of reported incidents in 2010 were phishing attacks. The breakdown on reports to us-cert.
在2010年,约53%的事件报告为钓鱼攻击。
New error pages provide a simplified user experience which helps to mitigate social-engineering and phishing attacks.
新的错误页面提供了一个简单的用户体验帮助用户减少社会工程学和仿冒网站攻击。
This could mean logging down all DNS queries - which is also useful to track down suspicious traffic trends from phishing attacks.
这可能意味着记录所有DNS查询-这对从钓鱼式攻击追捕可疑流量趋势也是有益的。
This was a great improvement in security intended to reduce phishing attacks and other password weaknesses, but on its own, it benefits only Google Apps users.
这是对安全的一大改善,目的是减少钓鱼攻击和其他密码软肋,但从其本身来说,它只是让Google应用的用户受惠。
Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.
钓鱼攻击在网上很常见,常常是以收到看似合法的电子邮件开始,邮件中含有逼真的网站(常常是银行或电子邮件供应商)的链接。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
In the same way, browser security helps protect you from malware, phishing, and other online attacks, while privacy features help keep your browsing private on your computer.
同样的道理,浏览器的安全保障让你远离恶意软件,网络钓鱼以及其他的网络攻击,而隐私保护功能保护你个人计算机的浏览隐私。
Strong passwords do nothing to protect online users from password stealing attacks such as phishing and keylogging, and yet they place considerable burden on users.
对网民来说,强密码对于诸如钓鱼攻击和键盘记录之类的密码盗窃手段毫无防御能力。 相反,强密码还会给网民带来相当大的负担。
What exactly are phishing and malware attacks?
那么,网络钓鱼与恶意软件攻击究竟是什么?
Some 51, 000 'phishing' attacks were recorded last year, up 16 per cent on the previous year.
据记录结果显示,去年约有五万一千个“网络钓鱼”攻击,较前年相比上升了16%。
Users need to use good judgement when giving out information, and be educated about possible phishing schemes and other social engineering attacks.
用户在给出信息时应该进行良好的判断,并且接受可能的网页仿冒方式以及一些社会工程攻击的培训。
Compromised computers are sometimes used to further other scams, such as "phishing" attacks that try to persuade users to reveal sensitive information such as bank passwords.
有时,受侵电脑会被进一步用于其他欺诈活动,例如网络钓鱼攻击,这种攻击往往会说服用户透露银行密码等敏感信息。
Computer security specialist says spear phishing often provides the means for even broader attacks.
电脑安全专家称为鱼叉式网络钓鱼常常为更深的攻击提供指导。
It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.
它还保护了公共密钥不能被篡改,从而防止网络欺诈,欺骗,和篡改代码的攻击。
Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
Identity theft fraudsters will trawl through sites which allow people to leave their pictures and personal details, finding targets for "phishing" attacks?
身份盗窃黑客将从允许人们上传照片和个人资料的网站上搜索个人信息,确定实施“网络钓鱼”的目标。
Utility employees are vulnerable to relatively low-tech "phishing" attacks that rely on "social engineering" to trick people into revealing sensitive information.
公用事业单位的员工极易受到技术含量相对较低的“网络钓鱼”攻击,这些攻击基于“社会工程学”,能够诱骗人们泄露敏感信息。 。
The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.
这个安全漏洞似乎影响到所有咨询网页,可以使用个人发布的恶意软件,进行钓鱼或各种不同的恶意攻击。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
应用推荐