词汇 | example_english_phishing |
释义 | Examples of phishingThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Password managers can also be used as a defense against phishing and pharming. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Simple homographic matching of domain names has resulted in phishing attacks where a domain can appear to be legitimate, but is not. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In contrast, an uninformed employee is susceptible to malware, phishing attacks, and other forms of social engineering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Phishing emails may contain links to websites that are infected with malware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A similar technique can be used to solve the phishing problem. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Personal information used in phishing attempts may be associated with spyware. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Phishing usually involves seemingly official electronic notifications or messages, such as e-mails or instant messages. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Protection is also granted through analyzing the behavior of known menaces in such a way that staying safe from phishing activities is a childs. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When enabled, every website the user visits is checked against a master list of known phishing sites. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Internet users may see fast flux used in phishing attacks linked to criminal organizations, including attacks on social network services. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Others have used the confusion in phishing attempts. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The tougher certificates, coupled with browser developments, could help fight phishing, which threatens the multi billion dollar online retail market. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Others can host phishing or money mule recruiting websites. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In 1997, the company claims to have discovered and disabled one of the earliest phishing attacks. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The company also launched a phishing simulator in 2013. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When used maliciously, it can be used to collect confidential information about businesses and individuals and to create more effective phishing schemes. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The symptoms were suspicious spam and phishing types of email. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Other features include e-mail spam filtering and phishing protection. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Independent of what definition is used, rock phishing is often used to refer to phishing attacks with some particular features. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Often the answers to these questions can easily be obtained by social engineering, phishing or simple research. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Phishing protection and real-time heuristics were also planned. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Legislation, user training, public awareness, and technical security measures are all attempts to control the growing number of phishing attacks. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。