What is the translation of " PHISHING ATTACKS " in Chinese?

Examples of using Phishing attacks in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
Phishing attacks.
钓鱼式攻击.
Naturally, most commonly these phishing attacks aim to steal users' Apple IDs.
自然,这些钓鱼攻击最常见的目的是窃取用户的苹果id。
Phishing Attacks on Modern Android.
现代Android上的网络钓鱼攻击.
Kaspersky's software detected 852,293 phishing attacks on MacOS in 2015.
卡巴斯基的软件在2015年对MacOS发现了852,293次网络钓鱼攻击
Phishing attacks can lead to identity theft.
AntiPhishing可以抵御身份盗窃攻击.
Social engineering methods- including phishing attacks- help to attract the potential victim's attention.
社会工程方法-包括网络钓鱼攻击-能帮助吸引潜在受害者的注意。
An important feature of FIDO2 reflected inWebAuthn is origin checking to prevent phishing attacks.
FIDO2在WebAuthn中体现的一个重要特性是检查origin,以防止网络钓鱼攻击
Over 20% of all phishing attacks mimicked banks and other financial organizations;
超过20%的钓鱼攻击会模仿银行和其它金融组织;.
Recently, the 360 Security Center intercepted a number of phishing attacks mainly targeting India and Kenya.
最近,360安全中心截获了一些主要针对印度和肯尼亚的网络钓鱼攻击
Of all spear phishing attacks launched in 2015, 43% targeted business with less than 250 employees.
在2015年发生全球网络攻击中,43%是针对雇用250人或更少人数的公司。
During the first half of 2019,we detected nearly 6 million phishing attacks, 11.8% of which targeted corporate users.
在2019年上半年,我们检测到近600万次网络钓鱼攻击,其中有11.8%是针对企业用户的。
Often Phishing Attacks can appear to come from a trusted source, such as your bank or a website that you regularly use.
通常,网络钓鱼攻击似乎来自可靠的来源,例如您的银行服务提供商或您经常使用的网站。
Extortion related to denial of service attacks and phishing attacks are two examples of criminal attacks..
伴随着敲诈勒索的拒绝式络服务攻击和络钓鱼攻击,是犯罪性络攻击的两个典型例子。
Often, phishing attacks appear to come from trusted sources such as your banking provider or a website you regularly use.
通常,网络钓鱼攻击似乎来自可靠的来源,例如您的银行服务提供商或您经常使用的网站。
With MacBooster,you will be kept away from Mac OS virus, phishing attacks, spyware, malware, and all kinds of online threats.
随着MacBooster,你会远离的MacOS病毒,网络钓鱼攻击,间谍软件,恶意软件和各种在线威胁。
Today, however, phishing attacks are highly complex and the damage to the victim can be extremely severe and even irreversible.
现在,网络钓鱼攻击却变得非常复杂,可以给受害者带来极其严重甚至是无法挽回的损失。
Banks, credit unions,and other financial institutions are prime targets for phishing attacks and other scams geared towards identity theft.
银行、信用合作社和其他金融机构是网络钓鱼攻击和其他针对身份盗用诈骗的主要目标。
This includes email-based phishing attacks or browser-based cross-site scripting or man-in-the-middle attacks..
这包括基于邮件的网络钓鱼攻击或基于浏览器的跨站点脚本或中间人攻击。
If successful, the attackers may use this knowledge against their targets,either through elaborated phishing attacks or cyber-extortion threats.
如果上述方法成功,攻击者可以利用这些知识通过精心设计的网络钓鱼攻击或网络敲诈威胁攻击目标。
This category of vulnerabilities is used in phishing attacks in which the victim is tricked into navigating to a malicious site.
此类安全漏洞常用于网络钓鱼攻击,即受害人被导航骗去一个恶意站点。
New phishing attacks are invented every year, but one of the oldest and time-tested methods is the slight misspelling of URLs.
每年都有新的钓鱼攻击被发明出来,但最古老且久经考验的方法是URL地址的轻微拼写错误。
Cybercriminals can also use this information to perform phishing attacks by pretending to be students or officials of an academic institution.
同时,网络罪犯分子也可以利用这些信息来伪装成学术机构的学生或官员来实施网络钓鱼攻击或社会工程活动。
Traditional phishing attacks attempt to deceive the targets into providing their passwords by creating a fake clone of, for example, Google's or Facebook's login page.
传统的网络钓鱼攻击试图通过创建例如谷歌或Facebook的登录页面的虚假克隆来欺骗目标提供其密码。
The report alsofound that most vulnerabilities are being exploited via phishing attacks and exploit kits that specifically target flaws in Microsoft products.
报告还发现,大多数漏洞都是通过网络钓鱼攻击和专门针对微软产品缺陷的漏洞利用工具包而被利用的。
There have been phishing attacks on individual Binance users, but a hacking attempt on the Binance exchange itself has never succeeded.
对Binance个人用户进行了网络钓鱼攻击,但对Binance交换本身的黑客攻击从未成功过。
Known to security researchers as the Carbanak group,the group used social engineering and phishing attacks to infiltrate businesses and steal financial data.
据安全研究人员介绍,这个叫做Carbanak的团伙利用社交工程和网络钓鱼攻击渗入到企业并从中盗取金融数据。
This particular brand of phishing attacks use previously stolen data to create authentic-looking emails that are difficult to stop and defend.
这种特定的网络钓鱼攻击使用以前被盗的数据来炮制格外逼真的电子邮件,难以阻止和防御。
They also investigated and mitigated 7,800 phishing attacks every month by identifying the underlying infrastructure used and then shutting them down.
我们每个月调查并减少了超过7800次钓鱼攻击,确定了这些攻击中使用的基础架构,并关闭它们。
Phishing attacks might be carried out through email messages, instant messages, and other social engineering techniques that reach users through various Internet channels.
网络钓鱼攻击可能通过电子邮件,即时消息和其他社交工程技术进行,这些技术通过各种Internet渠道传达给用户。
The emails are a classic example of phishing attacks: messages that look official and encourage people to enter personal information and other useful details.
电子邮件是钓鱼攻击的典型例子,表面看起来非常正规并鼓励人们输入个人信息和其他有用细节。
Results: 57, Time: 0.0492

Word-for-word translation

Top dictionary queries

English - Chinese