Blackmail, espionage, data theft. These are things that were proposed as reasonable things to do.
勒索、刺探、数据窃取,这些被当作合理的事情提议出来。
Whether you are concerned with privacy, data theft, data loss, or data leaks, Password Folder is an ideal tool for you.
无论您是个人隐私,数据窃取,数据丢失或数据泄漏问题,密码文件夹是您的理想工具。
Cloud computing offers new computing opportunities, but it also raises new security issues due to new potential ways for data theft.
云计算提供了全新的计算机遇,不过由于新的数据窃取潜在方式也带来了新的安全问题。
With mobile and desktop computers acting as storage devices for sensitive information, data loss and data theft are on the rise.
随着移动和台式电脑作为敏感信息的存储设备的作用,数据丢失和数据失窃案不断上升。
As I'm sure you're aware, there are dangers associated with social networking including data theft and viruses, which are on the rise.
当然,使用社交网络亦有风险,就是有时你会遇到网络偷盗行为和病毒,这些情况都在呈现上升的趋势。
All kinds of computers are vulnerable to electrical failures or data theft. But bacteria are immune from cyber attacks. You can safeguard the information.
所有类型的电脑都容易遭受电力故障或数据被盗。但是细菌对于网络攻击是免疫的。你可以对信息进行安全地保护。
The company, Dataguise, offers automated and advanced database security solutions to help organizations ensure regulatory compliance and protect against data theft.
Dataguise公司提供自动化高级数据库安全解决方案来帮助组织确保遵守法规并保护数据免受盗窃。
The interceptable nature of wireless signals and the limited memory and computing power of most handheld devices leaves wireless systems dangerously vulnerable to data theft.
无线信号的可截取本质以及大多数手持设备有限的内存和计算能力,使无线系统极易受到数据窃贼的攻击。
They acknowledge that privacy and data theft are legitimate concerns in a pervasively connected environment, but they feel it is already too late to stop the juggernaut of change.
他们提到,在普遍联系的环境中,对隐私和数据窃取的考虑是理所应当的,但是,他们感到现在停止对变化的崇拜已经太晚了。
Worst yet, they may find themselves more likely targets of hacking, corporate espionage, and data theft, as their contract employees may be similarly fixated on their own profits over all else.
更糟的是,他们会发现自己更倾向于非法侵入,企业间谍和数据盗取,因为他们的劳务工也是把利润看的比一切都重要。
Palo Alto Networks Director of Threat Intelligence Ryan Olson said the malware had limited functionality and his firm had uncovered no examples of data theft or other harm as a result of the attack.
帕洛·阿尔托网络公司的情报总监雷恩·奥尔森表示,这款恶意软件的功能有限,他的公司还没有发现由于这次袭击而造成的用户数据被盗或者是其他损害。
As people rely more and more on mobile devices, the chances for loss and theft of data from these devices increases.
人们对移动设备的依赖性越来越强,由于设备丢失而导致的数据丢失和盗窃事件将增加。
Everyone from grandmothers to Fortune 500 companies has heard the stories of identity theft, data loss, and general mayhem caused by viruses and attackers on the Internet.
每个人,从老祖母到全球 500强公司都听说过由互联网上的病毒和攻击者所引起的盗窃身份、丢失数据,及一般性的伤害的事。
Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
Identity theft and data breaches are some of the fastest-growing crimes in United States.
身份失窃和数据泄露是美国增长最快的犯罪类型之一。
The 30 day cache solves the user-error problem and the fact that data is stored on the Internet solves the fire/flood/theft issue (where USB or network drives may also be affected).
30天的缓存解决了用户错误的问题,同时由于数据存储在互联网上,也就避免了火灾、洪水和盗窃的问题(而USB和网络硬盘是无法避免这些问题的)。
This is hardly the first time that a big security breach has led to the mass theft of digital data. But the fallout from the Epsilon debacle will spread far and wide.
这已经不是第一次由于安全系统遭到破坏而导致大规模用户数据信息的失窃了,但这次Epsilon的失窃影响长远。
The XSLT joins each theft with its associated location, vehicle, victim, and witness to present the data logically.
XSLT连结每起盗窃事件及其关联的位置、车型、失主和证人,以符合逻辑地显示数据。
The threat today is not simply about vandalism but outright theft of confidential information, such as credit-card Numbers, social-security details, financial data, marketing plans and trade secrets.
如今它不只是简单地破坏、进而更盗取和泄漏保密信息,如信用卡号码、身份证号码、金融数据、营销计划和商贸机密。
However, the problems such as low data quality, sensitive data leakage, external malicious theft and so on, it is urgent to study the effective information security strategy.
然而数据质量低下、敏感数据外泄、外部恶意窃取等问题随之而来,研究行之有效的信息安全策略已刻不容缓。
But the McAfee report is among the most thorough attempts yet to map the scale and range of such data-theft efforts.
而此次McAfee的报告,则是历年所有此类数据盗窃报告中对程度和范围描述最为彻底的报告之一。
Trojans are designed to cause loss or theft of computer data, and to destroy your system.
木马程序的目的是造成损失或被窃的计算机数据,并破坏您的系统。
New regulations also may be needed to deal with special Internet crimes like the dissemination of computer virus, the theft of personal data stored on hard discs, and the like.
我们可能需要新的规章制度来应对特殊的网络犯罪,比如传播病毒,盗窃硬盘上的个人数据和其他类似的犯罪行为。
Guardian Mobile is actually an anti theft Nokia software through which you can actually protect your smartphones data and other private stuff remotely.
卫移动实际上是一项反盗窃诺基亚通过该软件可以真正保护您的智能手机的数据和其他私人的东西遥。
Frees the User from the Threat of Theft as Full Protection of Data from being Misused is guaranteed.
免于作为完整的数据保护,用户盗窃威胁被滥用的保障。
It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication.
它给人们带来种种便利的同时也带来了一系列的信息安全问题,比如信息窃取问题、多媒体信息的版权保护问题、信息篡改问题等。
Also some wildly overestimate the financial loss they suffered or the time it took to resolve problems caused by theft of login details, credit card Numbers or other valuable data.
还有像一些财政损失,和由于偷窃登录信息,信用卡号码或其他有价值的数据而造成的解决问题时间的延长,这些也都会存在起初数据的高估现象。
But in Massachusetts, theft and general theft of electronic data, as the statute of limitations for prosecution of 6 years.
但是,在马萨诸塞州,盗窃和盗窃一般的电子数据,作为限制为6年起诉的章程。
But in Massachusetts, theft and general theft of electronic data, as the statute of limitations for prosecution of 6 years.
但是,在马萨诸塞州,盗窃和盗窃一般的电子数据,作为限制为6年起诉的章程。
应用推荐