Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.
钓鱼攻击在网上很常见,常常是以收到看似合法的电子邮件开始,邮件中含有逼真的网站(常常是银行或电子邮件供应商)的链接。
The exact same attack methodologies are used to make a website host malware or a phishing site.
而制作恶意软件网站和钓鱼网站也采用了一模一样的方法。
A scammer could use this information to build a profile of a person and then target them with convincing phishing messages—perhaps referring to specific purchases on another website.
骗子们用这些信息追踪受害者,然后或是通过网络诈骗信息使人们信服,或是运用在其他网站所购具体物品进行诈骗,以锁定目标。
In each phishing scam, thousands of account holders are targeted by criminals, who send emails pretending to be from the customer's bank and directing them to enter their password on a bogus website.
在每一个钓鱼式欺诈案中,数千个帐户持有人被犯罪分子锁定。这些犯罪分子假装以客户银行的名义向他们发送电子邮件并诱导他们在虚假的网页上输入帐户口令。
In addition to these spam users create trouble, and some of the "phishing" fraud this website imitated. pose a threat to the security of personal data to the users.
这些垃圾邮件除了给使用者造成麻烦外,有的还通过“网络钓鱼”这种网页仿冒欺诈,对使用者的个人数据安全构成威胁。
In addition to these spam users create trouble, and some of the "phishing" fraud this website imitated. pose a threat to the security of personal data to the users.
这些垃圾邮件除了给使用者造成麻烦外,有的还通过“网络钓鱼”这种网页仿冒欺诈,对使用者的个人数据安全构成威胁。
应用推荐