The recent resurgence in hijacked accounts appears to be hackers exploiting Twitter's legacy lack of email confirmation.
一些违规行为不是黑客利用安全漏洞所造成的结果,而是数据在网络上公开访问的安全疏忽造成的。
Some breaches were not the result of hackers exploiting security vulnerabilities, but of security oversights that made data openly accessible on the web.
黑客利用这种技术瞄准英国航空公司的事实表明该公司没有实施强有力的网络安全措施。
The fact that hackers used this technique to target British Airways shows that the company does not implement strong cybersecurity measures.
第二天,黑客利用另一个电子转帐把钱转到英国的账户。
The next day, the hackers used another electronic transfer to move the money to accounts in Great Britain.
虽然目前还没有这些信息被黑客利用的事例,但是或许这也只是时间问题罢了。
Although no evidence has been found to date of hackers exploiting these flaws, it may only be a matter of time.
这意味着黑客利用七号信令系统验证机制,接管受害人的账户并实施中间人攻击。
This means that hackers exploit the SS7 to compromise the verification mechanism and take over the victim's account and impersonate him.
一些黑客利用合法服务器从事黑客活动,而McAfee防火墙能收集到这些黑客的信息。
Louis Vuitton Belts Some hackers use legitimate server engage in hacking activities, and McAfee Firewall able to collect information about these hackers..
也就是说黑客利用SS7攻陷了验证机制并接管了受害者的账户并模拟受害者的行为。
This means that hackers exploit the SS7 to compromise the verification mechanism and take over the victim's account and impersonate him.
浏览器插件导致黑客利用过去的弱点,因此重要的是用户了解启用插件的风险。
Browser plugins have led to hackers exploiting weaknesses in the past, so it is important users understand the risk of enabling plugins.
之后,黑客利用他们从90个帐户的收购中学到的知识,成功地攻陷了Bitrue的热门钱包。
Afterward, hackers used what they learned from their 90-account takeover to successful compromise Bitrue's hot wallet.
并且有些数据泄露并不是黑客利用安全漏洞所致,而是错误的行为导致数据可能被网上公开访问。
Some breaches were not the result of hackers exploiting security vulnerabilities, but of security oversights that made data openly accessible on the web.
黑客利用社交工程操纵人们交出他们的敏感信息,如密码和银行信息。
Hackers use social engineering to manipulate people into giving up their sensitive information such as passwords and bank details.
黑客利用微软的漏洞从供应商跳到HomeDepot的数据库。
Hackers used a vulnerability in Microsoft to jump from the vendor to Home Depot's database.
也有可能是黑客利用这个网站打开了进入访客系统的后门,让他们控制受害者的电脑。
It also is possible the hackers used the site to open a back door into visitors' systems, giving them control over their victims' computers.
过去的安全研究还发现,黑客利用虚假的防病毒应用程序欺骗不起眼的用户将恶意软件下载到他们的设备。
Past security research has also uncovered hackers exploiting fake antivirus apps to trick unassuming users into downloading malware to their devices.
增长黑客利用分析思维,产品工程和创造力来显著提升他们公司的核心数据。
Growth hackers use analytical thinking, product engineering and creativity to significantly increase their company's core KPIs.
这些缺陷尤其应该受到重视,因为很可能无法阻止黑客利用它们。
These flaws are particularly prized because therewill likely be no way to stop hackers exploiting them.
加拿大广播公司(CBC)称,上月有黑客利用中国境内服务器,入侵加拿大财政部及国库局计算机系统。
The Canadian Broadcasting Corp said hackers using China-based servers last month had broken into computer systems at the finance department and treasury board.
黑客利用SWIFT全球金融网络大致窃取来自台湾远东国际银行的6000万美元。
Hackers exploited the SWIFT global financial network to steal roughly $60 million from Taiwan's Far Eastern International Bank.
这些漏洞可能被黑客利用来访问或控制网站,注入恶意软件、病毒或其他恶意脚本。
These vulnerabilities can be exploited by hackers to gain access to or control of the website, inject malware, viruses, or other malicious script.
由于病毒、蠕虫以及黑客利用系统弱点的行为的盛行,有必要建立能做出可能的迅速反应的机制。
With the prevalence of viruses, worms and hackers taking advantage of system vulnerabilities, it is also necessary to have mechanisms in place to make possible immediate responses.
也不知道黑客利用了什么机制来保持他们在侵入网络中的存在。
Nor was it known what mechanism was used by the hackers to maintain their presence on the infiltrated networks.
虽然尚未发现数据已被黑客利用,但这可能只是时间上的问题。
Although no evidence has been found to date of hackers exploiting these flaws, it may only be a matter of time.
没人希望黑客利用现成的更新通道,让系统运行恶意固件或软件。
No one wants a hacker to use the established update channel to cause the systemto run malicious firmware or software.
与此同时,身份窃贼和黑客利用电子商务平台的漏洞对成人和儿童实施诈骗和剥削;.
Meanwhile, identity thieves and hackers have exploited vulnerabilities in e-commerce platforms to defraud and exploit adults and children alike;
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt