Black hats and other malicious hackers can use Metasploit against enterprises to identify exploits that will grant them unauthorized access to networks, applications and data.
需要技术熟练的IT专业人员,强烈希望解决问题,防止恶意黑客对网络系统造成损害。
There's been need of technically skilled IT pros with a strong desire to solve problems andprevent malicious hackers from causing damage to network systems.
Moxa(摩莎)工业物联网(IIoT)中存在多种严重漏洞,可导致恶意黑客对工业互联网发动远程攻击。
Serious vulnerabilities found in an industrial IoT(IIoT)platform from Moxa could enable malicious hackers to launch remote attacks on industrial networks.
他们的行动可能不会完全遵守法律,但他们的本意是阻止恶意黑客。
They may or may not operate completely within the law,but their intent is to stop malicious hackers.
但是,由于连接的社区初具规模,新的风险产生了-网络故障和恶意黑客。
However, as the connected community took shape, new risks arose-network failures and malicious hackers.
最后,漏洞管理区可以帮助解决从恶意黑客到欺诈性交易的问题。
Finally, the vulnerability management area helps out with catching problems from malicious hackers to fraudulent transactions.
安全保证敏感的个人信息保持私密,并且保护整个系统免受恶意黑客的侵害。
Security ensures that sensitive personal information is kept private andthat the overall system is protected from malicious hackers.
在最近的两个案例中,流量转移已经影响到金融网站,可能会将人们的私人数据暴露给恶意黑客。
In two of the most recent cases, traffic rerouting affected financial sites andcould have possibly exposed private data to malicious hackers.
But DeepLocker, the proof-of-concept malware developed by IBM, showed that such attacks mightsoon become the normal modus operandi of malicious hackers.
自1987年以来,一直在对付恶意软件和恶意黑客,从分解早期的DOS病毒开始。
He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses.
为了发起ping拒绝服务攻击,恶意黑客首先需要查找受害者的计算机或设备的IP。
In order to launch a ping denial-of-service attack, the malicious hacker first needs to find out the IP of the victim's computer or device.
然而,要想取得成功,恶意黑客必须首先查找设备的IP地址。
However, in order for this to be successful, the malicious hacker must first find out the IP address of the device.
我们将继续使用我们资源领先这个特点来应对恶意黑客并捍卫我们的客户免受攻击,无论这个恶意攻击来自谁。
We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them.
但是至高无上的声音也为恶意黑客打开了一扇机会之窗-特别是在语音诈骗方面。
But the supreme reign of voicehas also opened a window of opportunity for malicious hackers- specifically, in the area of voice fraud.
Smart home infrastructure,wearable devices and autonomous vehicles are among top targets for vicious hackers and robbers, making them vulnerable to breaches and violations.
这并不是说所有恶意黑客都很笨。
This is not to say that all malicious hackers are dumb.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt