请输入您要查询的英文单词:

 

单词 phishing
释义

Examplesofphishing

phishing
Similarly, an individual could accidentally ' 'leak' ' his or her own data through a ' 'phishing' ' attack or other online breach.
From theCambridge English Corpus
Password managers can also be used as a defense againstphishingand pharming.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Simple homographic matching of domain names has resulted inphishingattacks where a domain can appear to be legitimate, but is not.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
In contrast, an uninformed employee is susceptible to malware,phishingattacks, and other forms of social engineering.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Phishingemails may contain links to websites that are infected with malware.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
A similar technique can be used to solve thephishingproblem.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Personal information used inphishingattempts may be associated with spyware.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Phishingusually involves seemingly official electronic notifications or messages, such as e-mails or instant messages.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Protection is also granted through analyzing the behavior of known menaces in such a way that staying safe fromphishingactivities is a childs.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
When enabled, every website the user visits is checked against a master list of knownphishingsites.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Internet users may see fast flux used inphishingattacks linked to criminal organizations, including attacks on social network services.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Others have used the confusion inphishingattempts.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The tougher certificates, coupled with browser developments, could help fightphishing, which threatens the multi billion dollar online retail market.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Smartphones are also victims of classic piracy related to the web:phishing, malicious websites, etc.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Others can hostphishingor money mule recruiting websites.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
#https://dictionary.cambridge.org//dictionary/english/phishing##
随便看

 

英汉双解词典包含207842条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/9/26 13:51:58