If a malware attack meant development could no longer access their work, what would happen?
这些恶意软件攻击主要针对个人或小型企业,但想象一下他们是否自己组织起来并将注意力转移到更大的范围。
These malware attacks target individuals or small businesses mostly but imagine if they got organized themselves and shifted their focus to something bigger.
信息技术专家估测,挡不住的那55%的恶意软件攻击因为主流杀毒软件无法检测而保持隐身状态。
Information technology(IT) experts estimate the remaining 55% of malware attacks go unnoticed because the leading antivirus programs are unable to detect them.
此外,恶意软件攻击方法增加并不意味着更多系统会被感染。
Also, just because there is an increase in malware attack methods doesn't necessarily mean that more systems will be infected.
该公司过去曾表示,它致力于阻止恶意软件攻击通过其网络发布的第三方广告。
The company has said in the past that it works to block malware attacks from third-party ads distributed through its networks.
安全和访问控制测试,可分析恶意软件攻击风险以及未经授权访问敏感数据的可能性,以及其他网络安全漏洞。
Security and access control testing to analyze malware attack risks and the possibility of unauthorized access to sensitive data, among other cybersecurity vulnerabilities.
但是,引起最多关注的攻击来自恶意软件攻击,通常由情报机构使用网络犯罪掩盖活动进行。
But the attacks that grabbed the most headlines came from malware attacks, often perpetrated by intelligence agencies using cybercrime to cloak activities.
这类的恶意软件攻击数量少也远在今日的威胁情势之外。
These types of malware attack are few and far between in today's threat landscape.
年前,恶意软件攻击不断增长,有组织的犯罪行为从中牟利。
Ten years ago, malware attacks were on the rise, with organized crime profiting from them.
我们被告知GTI的运营已经停滞不前,因为他们的系统已关闭(由于恶意软件攻击)。
We have been informed that the operations at GTI havecome to a standstill because their systems are down(due to the malware attack).
恶意软件采用多种形式,旨在实现的目标也多种多样,因此恶意软件攻击几乎可以来自任何地方。
Malware takes many forms andcan be designed to accomplish many goals so a malware attack can come from just about anywhere.
绝大多数(93%)受访网络安全研究人员指出,非恶意软件攻击对企业造成的风险大过商业恶意软件攻击。
The vast majority(93%) of cybersecurity researchers said non-malware attackspose more of a business risk than commodity malware attacks.
此外,“TURBINE”系统的运行也得到了其他国家政府的支持,其中一些国家还参与了恶意软件攻击。
What's more, the TURBINE system operates with the knowledge and support of other governments,some of which have participated in the malware attacks.
Last March,Operation Taiex led to the arrest of the gang leader behind the Carbanak and Cobalt malware attacks on over 100 financial institutions worldwide.
恶意软件如夜龙或震网病毒,是最有名的例子,这些恶意软件攻击可以对控制系统产生破坏性影响。
Malware such as Night Dragon andStuxnet are the best-known examples of the devastating impacts that these malware attacks can have on control systems.
The survey of users registered with Kaspersky found more than 588,000Android users worldwide faced financial malware attacks, six times higher than the prior 12 months.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt