Using these stolen credentials, malicious actors can take over accounts and steal personal data, creating a snowball effect that can be devastating for your business.
这是因为恶意攻击者现在使用一系列工具采用大多数程序员想象不到的方式进行反向工程、跟踪和操纵应用。
That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.
这是为了防止恶意攻击者控制合法的扩展及其用户。
This is intended to help prevent malicious actors from taking control of legitimate add-ons and their users.
此外,恶意攻击者也利用不同的工具让识别这类设备变得更加困难。
At the same time, malicious attackers are employing various tools to make it harder to identify compromised devices.
这些漏洞可能会暴露用户数据或允许恶意攻击者访问测试和开发中使用的计算机和服务器。
These vulnerabilities can leave user data exposed orallow malicious actors to gain access to computers and servers used in testing and development.
这份报告指出恶意攻击者不断试图破坏应用程序,而WAF则是有效分层防御战略的关键组成部分。
According to the report, malicious attackers are constantly aiming to breach applications, and WAFs are a key part of an effective, layered prevention strategy.
恶意攻击者可以通过VoIP渗出敏感数据,这给企业制造了安全漏洞。
Malicious actors can exfiltrate sensitive data over VoIP, creating a security hole for enterprises.
据报告可知,有些情况下由于客户未能应用可用的Oracle补丁,恶意攻击者取得了成功。
In some instances, it has been reported that malicious attackers have been successful because customers had failed to apply the Oracle patches.
由于Golang通常不会被反病毒软件检测到,因此恶意攻击者已开始将其用作恶意软件语言。
As Golang isnot typically detected by anti-virus software, malicious actors have started using it as a malware language.
These connected devices represent an enormous attack surface which is activelybeing exploited by legitimate security researchers and malicious attackers alike.
如果没有收费,任何恶意攻击者只需发送数百万笔微小的交易就能填满整个系统并使系统瘫痪。
Without fees any malicious attacker could simply send millions of tiny transactions just to fill up the blocks and paralyze the system.
恢复出厂设置进程中的信息披露漏洞可让本地恶意攻击者获取先前所有者的数据。
An information disclosure vulnerability in the factoryreset process could enable a local malicious attacker to access data from the previous owner.
最终,这将使恶意攻击者能够访问其他赛门铁克客户的信息,识别高价值目标,并执行自动化攻击。
This would have, eventually, allowed the malicious attacker to access information on other Symantec customers, identifying high-value targets, and perform automated attacks.
夏娃是被动和顺从的窃听者,恶意攻击者是马洛里,所有人都信任的特伦特,仅举几例。
There's Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.
平均而言,企业要花256天发现由恶意攻击者造成的数据泄露事故,并花82天来遏制它。
On average,it took respondents 256 days to spot a breach caused by a malicious attacker, and 82 days to to contain it.
恶意攻击者占恶意攻击事故的55%,而下一个最大的攻击来源是人为错误,占25%。
Malicious outsiders accounted for 55 per cent of the breach incidents, while the next largest source is human error, at 25 per cent.
而一旦量子计算机落入恶意攻击者手中,就能够解密当前受到公司和政府保护的敏感数据。
A quantum computer in the hands of a malicious attacker will be able to decrypt sensitive data currently protected by corporations and governments.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt