Examples of using Hackers could in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
How hackers could wreak havoc on the US election.
What we do know is that forat least 50 million users, the hackers could have seen everything.
Hackers could use this to steal your information.
The implication appears to be that the hackers could have stolen much more money had the exchange's alarm bells not sounded.
Hackers could steal your customer's credit card numbers from your website, or steal passwords from your computer.
People also translate
Google has rewarded an Uruguayan schoolstudent $10,000 after he exposed a security flaw which hackers could have used to access sensitive data.
This means hackers could use smart TVs to discover what is happening in company's meeting room.
Worse, if you used that same password for other accounts, the hackers could take control of your email, social media, and financial accounts.
The hackers could be trolls who decide to post a database of millions of people's private messages online for everyone to read.
Many networks didn't have strong access controls,so hackers could get a lot of mileage out of compromised employee credentials.
Hackers could threaten to revoke access or post the sensitive information online if not given money; one Indiana hospital paid $55,000 to hackers for this very reason.
Io's researchers believe that the“hashing power” of ETCblockchain is not as strong as it should be and hackers could easily rent hashing power for another 51% attack.
Hackers could access those credentials by reviewing the code in the apps, then gain access to data sent over those services.
Last year,a group of researchers at MWR InfoSecurity showed how hackers could turn some models of Amazon Echo into the covert listening device.
Hackers could in many organizations easily gain access to industrial environments from the corporate network, according to an analysis conducted by Positive Technologies.
Itsik Mantin, Imperva director of security research at Imperva,agreed and added the hackers could use the data they stole to hurt Hacking Team customers.
That means the hackers could have had access to user data for a long time, as Facebook is not sure when the attack began.
In a paper published in August,computer scientist Jason Polakis and his colleagues analyzed the many ways that hackers could abuse Facebook's Single Sign-On tool.
What if, someday, hackers could use devices like your TV or your refrigerator to send malicious emails that infect other internet-connected devices all over the world?
If in the event that you will receive huge amount of Bitcoins on your online wallet,move them as fast as you can to your offline wallet before the hackers could attack.
Instead, hackers could potentially have accessed everything from people's private messages on Tinder to their passport information on Expedia, all without leaving a trace.
Depending on the software you use for your site,and how secure your passwords are, hackers could potentially use your password to gain access to your accounts on other websites.
Hackers could shoot the necessary video without phone users ever noticing, especially in busy settings such as a bar, restaurant, bus, train, airport or shopping mall.
If a website where you have a profile or account gets hacked,for instance, hackers could use your password and attempt to log into your other accounts, such as your Gmail.
The hackers could shoot the said video with the phone users not noticing them, especially in busy surroundings such as a bar, restaurant, bus, train, airport or shopping mall.
GHOST is considered to be critical because hackers could exploit it to silently gain complete control of a targeted Linux system without having any prior knowledge of system credentials(i.e. administrative passwords).
Hackers could misuse this technology against the public itself, and one should not forget that with the advance in technology, the techniques leveraged by hackers and cyber criminals also improves.
Microsoft's notification revealed that hackers could have viewed account email addresses, folder names, and subject lines of emails, but in a separate notification to other affected users the company also admitted email contents could have been viewed.
With Ebury, hackers could steal usernames and passwords, as well as use compromised systems to send massive amounts of spam, according to German cybersecurity authority CERT-Bund.
As it turned out, hackers could perform any actions with tokens- for example increasing or decreasing the displayed amount and burning coins- using only one parameter of the smart contract.