Примери за използване на Phishing attack на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Information about phishing attack.
Phishing attacks are big business.
These e-mails are PHISHING attack!
Phishing attacks are a nasty business.
Those messages represent a PHISHING attack!
The phishing attack seems to have succeeded after all.
Google Docs underwent a phishing attack.
A phishing attack happens when someone tries to trick you into sharing personal information online.
Google Docs suffers massive phishing attack.
Make sure they know what a phishing attack and a disreputable games website look like, so they know not to fall for these scams.
If it closes the app, and with it the dialog,then this was a phishing attack.
The spyware, called XAgent,is delivered via a phishing attack using a technique called island hopping.
If the app closes and the dialog box closes with it,then it was a phishing attack.
Percent said they were victims of a phishing attack, losing on average $158.
Cyber insurance rejects claim after BitPay lost $1.8 million in phishing attack.
While hackers can only attempt a phishing attack through email on your computer, hackers can phish you through emails, texts, and calls to your mobile phone.
In 2014, the personal data of 145 million eBay users was compromised in a phishing attack.
However, they told us that they did not know about such a phishing attack and had not been informed by the MFA.
Since mobile devices are always powered-on they represent the front lines of any phishing attack.
A phishing attack takes place when someone masquerades as someone else to trick you into sharing personal or other sensitive information with them, usually through a fake website.
An identical scam has been affecting a number of large companies,which have suffered a phishing attack whose goal was to access their data.
The Google Docs phishing attack spread quickly across social media last week before it was stopped, and now Google is tightening its processes to prevent a repeat.
First, it can cost the victim real money and second,organizations whose names have been used in a phishing attack, often have to bear the support costs.
Last week's Google Docs phishing attack sent waves across social media, as users including journalists, academics and employees from high-profile corporations were affected.
Typically, attackers compromise the email account of a senior executive orfinancial officer by exploiting an existing infection or via a spear phishing attack.
As a way of being carried out,the hacker's operation against the MFA is very similar to the phishing attack against the US Democratic Party, where a huge amount of information was downloaded illegally.
The Junk E-mail Filter also automatically evaluates each incoming message to discover whether it might be suspicious,potentially fraudulent, or part of a phishing attack.
They can also use various fraudulent methods to access your company passwords, like a phishing attack, in which they disguise themselves as an official entity(like Google) and trick people into providing their passwords.
You may recall the infamous iCloud hack of 2014, in which the private photos of several(mostly female) celebrities, including Jennifer Lawrence and Kirsten Dunst,were leakedfollowing a phishing attack.
A phishing attack specifically targeting the enterprise's top executives is called whaling, as the victim is considered to be high-value, and the stolen information will be more valuable than what a regular employee may offer.