phishing
英式音标:[ˈfɪʃɪŋ] 美式音标:[ˈfɪʃɪŋ]
phishing基本解释 n. 网络钓鱼;网络欺诈(以虚假的身份和形象随机骗取个人帐号和密码等) phishing的意思释义 释
phishing怎么读
英式音标:[ˈfɪʃɪŋ]
美式音标:[ˈfɪʃɪŋ]
phishing基本解释
n. 网络钓鱼;网络欺诈(以虚假的身份和形象随机骗取个人帐号和密码等)
phishing的意思释义
释义
网络仿冒;
英英释义
PhishingPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.Van der Merwe, A J, Loock, M, Dabrowski, M.
phishing用法及例句
双语例句
用作名词(n.)
A phishing e-mail has been detected.
已检测到网络钓鱼邮件。
Do you want to turn on the phishing filter?
你愿意打开反网络钓鱼过滤功能么?
例句参考
Why phishing worksWhy Phishing Works
Why Phishing Works
Why Phishing Works
Why phishing works
Why Phishing Works
Social phishing
Learning to detect phishing emails
The battle against phishing:Dynamic Security Skins
You\'ve been warned:an empirical study of the effectiveness of web browser phishing warnings
phishing词源
phishing (n.)
in the cyber scam sense, by 2000 (some sources cite usage from 1995); alteration of fishing (n.); perhaps by influence of phreak and the U.S. rock band Phish, which had been performing since 1983.
phishing相关例句
1. But one of the first things we saw was a warning about a \"phishing scam\".
而我们较先看到的是关于“网络钓鱼陷阱 ”的一个警告。
voa.hjenglish.com
2. It’s called “phishing” because the badguys throw out electronic bait and wait for someone to bite.
称之为“网络钓鱼”的原因在于,那些坏家伙抛出了电子诱饵,等着有人上钩。
3. The typical stuff we’re seeing, though, right now: the colored background noise, phishing attacks.
不过我们目前看到的典型情况是:有色背景噪音,网络钓鱼攻击。
4. Job sites are regularly attacked by hackers and via email \"phishing\" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。
5. The company also needs to find a way to address the rise of spam, phishing, and malware on the site.
该公司还继续寻找有效的方法来应对网站出现的垃圾信息、网络钓鱼以及恶意软件。
6. Beware of phishing. Never purchase products or services by responding to an email. This generally results in your card number being phished.
谨防网络诈骗。绝不通过电子邮件购买产品或服务。这样通常的结果就是你的卡号被骗走了。
7. Similar to phishing, smishing uses cell phone text messages to deliver the \"bait\" to get you to divulge your personal information.
与网络钓鱼方式类似,短信诈骗通过手机文字信息放“饵”以诱使你泄露个人信息。
8. Cyber attacks are becoming more pervasive and often rely on spear phishing - targeted emails that trick recipients into clicking on bad links or attachments.
黑客攻击越发猖獗,经常是通过鱼叉式网络钓鱼—利用针对一些特定组织的邮件,使收件人点击到错误的链接或附件。
9. To him, recent phishing operations against Google are not even worthy of a blog post, as such events happen so frequently.
对他来说,较近谷歌的网络钓鱼事件根本不值一提,因为类似事件层出不穷。
10. This week Google revealed that a cyber attack originating from China had used a technique known as “spear phishing” to extract Gmail passwords from unwary users.
本周谷歌披露说,一次来源于中国的网络攻击,通过使用一项“鱼叉式网络钓鱼”技术提取那些粗心大意的谷歌邮箱用户的账号密码。
bbs.ecocn.org
11. Phishing takes place when someone masqueradesas someone else, often with a fake website, to trick you into sharing personalinformation.
当一个人伪装成另一人时,网络钓鱼就上演了,往往会有一个冒牌网站,以便愚弄你共享个人信息。
12. Related: Can you spot a cleverly disguised phishing e-mail?
相关信息:你能否找到巧妙伪装的网络钓鱼电子邮件?
13. Phishing: These scams send phony but official-looking email from your bank or financial institution.
网络钓鱼 :这些诡计会发送伪造但看起来像来自于你的银行或金融机构的官方邮件。
14. As for anti-phishing and malware downloads, there are a number of services that track “bad” sites and warn users off.
对于网络钓鱼和恶意软件下载,要有大量地追踪恶意站点和警告用户远离的服务。
15. “Malicious code through multiple means (e.g., phishing, virus, logic bomb) continues to be the most widely used attack approach,” the report states.
报告指出,“通过多种恶意代码方式(例如网络钓鱼、病*、逻辑炸弹)仍然是目前较广泛使用的攻击方法。”
18. Modernbrowsers also help protect against malware and phishing.
现代浏览器也能帮助用户防御流氓软件和网络钓鱼。
19. In the case of RSA hackers used \"spear phishing\" e-mails to trip up someone within the company, says Ghosh, also the founder and CEO of cyber security technology maker Invincea, Inc.
在RSA受攻击的案例中,黑客用“网络钓鱼”邮件给公司内部的员工使绊,高希说,他也是网络安全技术制造者Invincea公司的创始人和首席执行官。
20. When you browse the web and perform transactionsonline, two security risks to be aware of are malware and phishing.
当你浏览web、进行网上交易时,两大安全风险亟需提防,即恶意软件与网络钓鱼。
21. Ally Bank and Bank of America rank last with a little over one percent of the total amount of phishing messages.
针对Ally银行和美国银行的网络钓鱼信息仅占所有总数的百分之一点几。
blog.sina.com.cn
22. A quarter of these businesses also report that they have been the victim of spam, phishing, and malware attacks via sites like Twitter, Facebook, LinkedIn, and MySpace.
有四分之一的企业也称他们已经成为垃圾邮件,网络钓鱼,恶意软件攻击的受害者,而这类攻击都是通过Twitter,Facebook,LinkedIn,和MySpace这样的站点发起的。
23. But bolting e-mail onto the Facebook social graph opens a whole new vector for this and other long-running e-mail scams, like phishing attacks.
但是将邮件放到Facebook这种公开社交平台上是垃圾邮件的发展方向,就像网络钓鱼。
24. But bolting e-mail onto the Facebook social graph opens a whole new vector for this and other long-running e-mail scams, like phishing attacks.
但是将邮件放到Facebook这种公开社交平台上是垃圾邮件的发展方向,就像网络钓鱼。