网站首页  词典首页

请输入您要查询的词汇:

 

词汇 example_english_phishing
释义

Examples of phishing


These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Password managers can also be used as a defense against phishing and pharming.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Simple homographic matching of domain names has resulted in phishing attacks where a domain can appear to be legitimate, but is not.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In contrast, an uninformed employee is susceptible to malware, phishing attacks, and other forms of social engineering.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Phishing emails may contain links to websites that are infected with malware.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
A similar technique can be used to solve the phishing problem.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Personal information used in phishing attempts may be associated with spyware.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Phishing usually involves seemingly official electronic notifications or messages, such as e-mails or instant messages.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Protection is also granted through analyzing the behavior of known menaces in such a way that staying safe from phishing activities is a childs.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When enabled, every website the user visits is checked against a master list of known phishing sites.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Internet users may see fast flux used in phishing attacks linked to criminal organizations, including attacks on social network services.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Others have used the confusion in phishing attempts.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The tougher certificates, coupled with browser developments, could help fight phishing, which threatens the multi billion dollar online retail market.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Others can host phishing or money mule recruiting websites.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
In 1997, the company claims to have discovered and disabled one of the earliest phishing attacks.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The company also launched a phishing simulator in 2013.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
When used maliciously, it can be used to collect confidential information about businesses and individuals and to create more effective phishing schemes.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
The symptoms were suspicious spam and phishing types of email.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Other features include e-mail spam filtering and phishing protection.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Independent of what definition is used, rock phishing is often used to refer to phishing attacks with some particular features.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Often the answers to these questions can easily be obtained by social engineering, phishing or simple research.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Phishing protection and real-time heuristics were also planned.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
Legislation, user training, public awareness, and technical security measures are all attempts to control the growing number of phishing attacks.
From
Wikipedia

This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
随便看

 

反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。

 

Copyright © 2005-2024 fscai.com All Rights Reserved 更新时间:2024/12/23 7:43:39