1. But one of the first things we saw was a warning about a "phishing scam".
而我们最先看到的是关于“网络钓鱼陷阱 ”的一个警告。

voa.hjenglish.com

2. It’s called “phishing” because the badguys throw out electronic bait and wait for someone to bite.
称之为“网络钓鱼”的原因在于,那些坏家伙抛出了电子诱饵,等着有人上钩。

article.yeeyan.org

3. The typical stuff we’re seeing, though, right now: the colored background noise, phishing attacks.
不过我们目前看到的典型情况是:有色背景噪音,网络钓鱼攻击。

www.infoq.com

4. Job sites are regularly attacked by hackers and via email "phishing" attacks, as they provide a rich source of data for those interested in identity theft.
招聘网站频频受到黑客的攻击,或遭受通过电子邮件“网络钓鱼”的攻击,因为它们为那些对身份盗窃感兴趣的人提供了丰富的数据资源。

article.yeeyan.org

5. The company also needs to find a way to address the rise of spam, phishing, and malware on the site.
该公司还继续寻找有效的方法来应对网站出现的垃圾信息、网络钓鱼以及恶意软件。

article.yeeyan.org

6. Beware of phishing. Never purchase products or services by responding to an email. This generally results in your card number being phished.
谨防网络诈骗。绝不通过电子邮件购买产品或服务。这样通常的结果就是你的卡号被骗走了。

article.yeeyan.org

7. Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information.
与网络钓鱼方式类似,短信诈骗通过手机文字信息放“饵”以诱使你泄露个人信息。

www.examw.com

8. Cyber attacks are becoming more pervasive and often rely on spear phishing - targeted emails that trick recipients into clicking on bad links or attachments.
黑客攻击越发猖獗,经常是通过鱼叉式网络钓鱼—利用针对一些特定组织的邮件,使收件人点击到错误的链接或附件。

article.yeeyan.org

9. To him, recent phishing operations against Google are not even worthy of a blog post, as such events happen so frequently.
对他来说,最近谷歌的网络钓鱼事件根本不值一提,因为类似事件层出不穷。

article.yeeyan.org

10. This week Google revealed that a cyber attack originating from China had used a technique known as “spear phishing” to extract Gmail passwords from unwary users.
本周谷歌披露说,一次来源于中国的网络攻击,通过使用一项“鱼叉式网络钓鱼”技术提取那些粗心大意的谷歌邮箱用户的账号密码。

bbs.ecocn.org

11. Phishing takes place when someone masqueradesas someone else, often with a fake website, to trick you into sharing personalinformation.
当一个人伪装成另一人时,网络钓鱼就上演了,往往会有一个冒牌网站,以便愚弄你共享个人信息。

article.yeeyan.org

12. Related: Can you spot a cleverly disguised phishing e-mail?
相关信息:你能否找到巧妙伪装的网络钓鱼电子邮件?

www.elanso.com

13. Phishing: These scams send phony but official-looking email from your bank or financial institution.
网络钓鱼 :这些诡计会发送伪造但看起来像来自于你的银行或金融机构的官方邮件。

article.yeeyan.org

14. As for anti-phishing and malware downloads, there are a number of services that track “bad” sites and warn users off.
对于网络钓鱼和恶意软件下载,要有大量地追踪恶意站点和警告用户远离的服务。

article.yeeyan.org

15. “Malicious code through multiple means (e.g., phishing, virus, logic bomb) continues to be the most widely used attack approach,” the report states.
报告指出,“通过多种恶意代码方式(例如网络钓鱼、病毒、逻辑炸弹)仍然是目前最广泛使用的攻击方法。”

www.etiri.com.cn

16. What exactly are phishing and malware attacks?
那么,网络钓鱼与恶意软件攻击究竟是什么?

article.yeeyan.org

17. A phishing scam is a kind of crime that uses e-mail to trick people into providing financial or other personal information.
网络钓鱼诈骗是一种利用电子邮件骗取人们财务和其他个人信息的犯罪行为。

voa.hjenglish.com

18. Modernbrowsers also help protect against malware and phishing.
现代浏览器也能帮助用户防御流氓软件和网络钓鱼。

article.yeeyan.org

19. In the case of RSA hackers used "spear phishing" e-mails to trip up someone within the company, says Ghosh, also the founder and CEO of cyber security technology maker Invincea, Inc.
在RSA受攻击的案例中,黑客用“网络钓鱼”邮件给公司内部的员工使绊,高希说,他也是网络安全技术制造者Invincea公司的创始人和首席执行官。

article.yeeyan.org

20. When you browse the web and perform transactionsonline, two security risks to be aware of are malware and phishing.
当你浏览web、进行网上交易时,两大安全风险亟需提防,即恶意软件与网络钓鱼。

article.yeeyan.org

21. Ally Bank and Bank of America rank last with a little over one percent of the total amount of phishing messages.
针对Ally银行和美国银行的网络钓鱼信息仅占所有总数的百分之一点几。

blog.sina.com.cn

22. A quarter of these businesses also report that they have been the victim of spam, phishing, and malware attacks via sites like Twitter, Facebook, LinkedIn, and MySpace.
有四分之一的企业也称他们已经成为垃圾邮件,网络钓鱼,恶意软件攻击的受害者,而这类攻击都是通过Twitter,Facebook,LinkedIn,和MySpace这样的站点发起的。

article.yeeyan.org

23. But bolting e-mail onto the Facebook social graph opens a whole new vector for this and other long-running e-mail scams, like phishing attacks.
但是将邮件放到Facebook这种公开社交平台上是垃圾邮件的发展方向,就像网络钓鱼。

article.yeeyan.org

24. But bolting e-mail onto the Facebook social graph opens a whole new vector for this and other long-running e-mail scams, like phishing attacks.
但是将邮件放到Facebook这种公开社交平台上是垃圾邮件的发展方向,就像网络钓鱼。

article.yeeyan.org