• Phishing attacks are common online, and usually begin with the arrival of a legitimate-looking email containing a link to a realistic-looking website - often a bank or email provider.

    钓鱼攻击网上很常见常常是以收到看似合法电子邮件开始,邮件中含有逼真网站(常常银行电子邮件供应商)的链接

    youdao

  • The exact same attack methodologies are used to make a website host malware or a phishing site.

    制作恶意软件网站钓鱼网站采用了一一样的方法

    youdao

  • A scammer could use this information to build a profile of a person and then target them with convincing phishing messages—perhaps referring to specific purchases on another website.

    骗子这些信息追踪受害者,然后或是通过网络诈骗信息使人们信服,或是运用其他网站所具体物品进行诈骗,锁定目标

    youdao

  • In each phishing scam, thousands of account holders are targeted by criminals, who send emails pretending to be from the customer's bank and directing them to enter their password on a bogus website.

    每一个钓鱼式欺诈案中,数千帐户持有人犯罪分子锁定。这些犯罪分子假装客户银行的名义向他们发送电子邮件诱导他们虚假的网页上输入帐户口令

    youdao

  • In addition to these spam users create trouble, and some of the "phishing" fraud this website imitated. pose a threat to the security of personal data to the users.

    这些垃圾邮件除了使用者造成麻烦外,有的通过网络钓鱼这种网页仿冒欺诈使用者个人数据安全构成威胁

    youdao

  • In addition to these spam users create trouble, and some of the "phishing" fraud this website imitated. pose a threat to the security of personal data to the users.

    这些垃圾邮件除了使用者造成麻烦外,有的通过网络钓鱼这种网页仿冒欺诈使用者个人数据安全构成威胁

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定