网站首页  词典首页

请输入您要查询的英文单词:

 

单词 phishing
释义

phishing

美 [?f????]
英 ['f????]
  • n.网络钓鱼;钓鱼式攻击
  • 网络网路钓鱼;钓鱼网站;网钓
phishing
n.
1.
网络仿冒,网钓(通过互联网或电邮骗取他人身份信息、银行账号等以盗取金钱)the activity of tricking people by getting them to give their identity, bank account numbers, etc. over the Internet or by email, and then using these to steal money from them

例句

释义:
1.
Ally Bank and Bank of America rank last with a little over one percent of the total amount of phishing messages.
针对Ally银行和美国银行的网络钓鱼信息仅占所有总数的百分之一点几。
blog.sina.com.cn
2.
He said he was the target of a combined telephone and phishing attempt in 2010.
他说,2010年一起同时利用电话和钓鱼的攻击就曾以他本人为目标。
c.wsj.com
3.
With malicious intent, this could have been a phishing site, fooling the user into revealing personal details.
如果带有恶意目的,所连向的可能是欺骗用户吐露个人信息的网络钓鱼(phishing)网站。
www.ftchinese.com
4.
Mr. Colford said the phishing attempt had been blocked, raising the question of how hackers had grabbed credentials for the account.
科尔福德说,那次钓鱼袭击已被拦截,人们由此质疑,黑客是如何拿到账户凭证的。
cn.nytimes.com
5.
Phishing attacks are identity theft emails that are written to look as if they were sent from legitimate organizations.
“网络钓鱼”攻击采取的途径是发出一种身份窃取电子邮件,它看起来很像是来自合法的公司。
dream4ever.org
6.
Internet security companies are trying to devise new ways to protect consumers from the newest spear-phishing scams .
网路安全公司试图开发新方法,以保护消费者免受最新近「鱼叉式网路钓鱼」诈骗之害。
dictsearch.appspot.com
7.
For an up-to- date report on phishing schemes that authorities have uncovered , visit the Anti- Phishing Working Group Web site .
有关权威机构所披露的网络仿冒骗术的最新报告,请访问反网络仿冒工作组网站。
www.bing.com
8.
In fact, phishing is probably much, much more likely to result in one of your accounts being compromised than password cracking.
事实上,假如您的某个账户被攻破,其原因很可能是钓鱼攻击,而不是密码遭破解。
www.bing.com
9.
phishing is not a virus or a Trojan, mainly due to your carelessness, did not see the Web site.
钓鱼网页并不是病毒,也不是木马,主要还是由于您粗心,没有看清网址。
it.zhishi.sohu.com
10.
Phishing is the practice of sending many mails in an attempt to get users to reveal personal or financial information.
网路钓鱼就是寄出大量信件、企图让使用者洩漏私人资讯或金融资讯。
203.64.184.214
1.
Whether early virus and phishing site alerts or simply a trusted information exchange, Members should benefit from such a community.
无论早期病毒和网络钓鱼网站警报,或干脆一个可信任的信息交流,大家应该从这样的一个社会。
hi.baidu.com
2.
PHISHING PROTECTION Phishing is the Internet scheme where you get a fake email note from your bank about a problem with your account.
网络钓鱼防护网络钓鱼是互联网的阴谋,你得到一个仿冒的银行电子邮件说你的银行帐户有问题。
www.bing.com
3.
We visited the ETS Web site for more information about the TOEIC. But one of the first things we saw was a warning about a "phishing scam. "
我们访问ETS网站上关于托业的更多信息,我们看到第一个警告是网络钓鱼。
www.unsv.com
4.
and its contributors, licensors and partners work to provide the most accurate and up-to-date phishing and malware information.
及其贡献者、授权者以及合作者尽量提供最精确以及最新的钓鱼攻击以及恶意软件的信息。
translations.launchpad.net
5.
According to a October 2009 PC World article, FBI director Robert Mueller no longer banks online as a result of a close phishing call.
在2009年10月的PC世界文章中提到,FBI局长罗伯特米勒不再将银行在线作为一种接受亲密式钓鱼。
www.bing.com
6.
Recently a specialized form for phishing has begun to appear- the term used for this is " spear phishing" .
一种网络钓鱼的特殊形式最近已经开始出现——我们用“鱼叉式网络钓鱼”这个术语来描述之。
wenwen.soso.com
7.
The agencies are the latest institutions to be exploited in "phishing" scams, long the bane of large banks and credit card issuers.
该机构的最新机构可利用“网络钓鱼”的骗局长期的祸根大银行和信用卡发卡机构。
www.sjgcz.cn
8.
As you browse the web, each page is checked quickly against a list of suspected phishing and malware websites.
当你浏览网页的时候,每个网址都会已知的钓鱼和恶意网站清单进行快速比对。
www.bing.com
9.
Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information.
与网络钓鱼方式类似,短信诈骗通过手机文字信息放“饵”以诱使你泄露个人信息。
www.chinadaily.com.cn
10.
These accounts appear to have been accessed through phishing scams, rather than a security breach at Google themselves.
而这些账户的泄露往往是网络钓鱼欺诈造成的,而非谷歌的安全漏洞造成的。
user.ccw.com.cn
1.
The 2007 Microsoft Office system helps to mitigate these risks to help protect you from homograph attacks used in phishing schemes.
2007MicrosoftOfficeSystem有助于降低这些风险以帮助您抵御仿冒骗术中使用的形似字攻击。
office.microsoft.com
2.
Clayton and his team have done extensive research into phishing sites hosted on cracked web servers.
克莱顿和他的小组对已经发现的钓鱼网站进行了广泛的研究。
www.bing.com
3.
asking them to update your account details or otherwise reveal further sensitive information, a scam known as spear-phishing.
仅是让他们更新一下账户详细信息或者其他方式都可以暴露其更多的个人敏感信息。这种诈骗手法称为鱼叉式网络钓鱼。
www.kekenet.com
4.
But one of the first things we saw was a warning about a " phishing scam" .
但我们首先看到的东西是一则关于“诈骗邮件”的警告。
voa.hjenglish.com
5.
Since most of the phishing emails come through spam, get a spam filter and install on your computer.
由于大部分的垃圾邮件,通过网络钓鱼电子邮件来,得到你的电脑安装垃圾邮件过滤。
dictsearch.appspot.com
6.
Phishing (pronounced "fishing" ) is an online fraud technique used by criminals to lure you into disclosing your personal information.
Phishing(网络仿冒,发音为“fishing”)是罪犯用来诱使您透露个人信息的网络诈骗技术。
office.microsoft.com
7.
And the product's built-in phishing protection ensures that you won't be giving that information to a fraudulent site.
这个产品内置网页仿冒防护保证您的个人信息不会被诈骗网站所窃取。
www.kafan.cn
8.
E-mail is at risk - vulnerable to external attack from viruses, spam, spyware and phishing technologies.
电子邮件存在风险——易受病毒,垃圾软件,间谍软件以及钓鱼技术的攻击。
blog.sina.com.cn
9.
In the To line, type the e-mail address of the company to whom you are reporting the phishing message.
在“收件人”行中,键入您要向其举报网络仿冒邮件的公司的电子邮件地址。
office.microsoft.com
10.
This Trojan is a typical phishing email, and millions of copies have been sent around the world.
该木马是种典型的钓鱼电子邮件,在全世界范围内已经发现了数以百万的感染者。
blog.163.com
1.
To him, recent phishing operations against Google are not even worthy of a blog post, as such events happen so frequently.
对他来说,最近谷歌的网络钓鱼事件根本不值一提,因为类似事件层出不穷。
www.bing.com
2.
We like AVG LinkScanner, too, which helps you to browse the web more safely, and protects against malware and phishing attacks.
我们也喜欢AVGLinkScanner,它能让你更安全的浏览网页,并且防护恶意软件和钓鱼攻击。
www.bing.com
3.
This research, in turn, is informing our design of anti phishing software so people are more likely to use it correctly.
而我们设计反网钓软体时,也同时利用这项研究的资讯,让大家可以更正确地使用软体。
www.showxiu.com
4.
Did you know that you can buy a keystroke logger for $23 or pay $10 to have someone host your phishing scam?
你知道自己可以花费23美元就能买到一个“键盘记录工具”或者花费10美元就可以让别人为你的“钓鱼欺诈网站”提供托管吗?
www.bing.com
5.
With birthdates, email addresses and home addresses, hackers can launch spear "phishing" attacks that are targeted at those individuals.
随着生日,电子邮件地址和家庭地址,黑客可以发动矛“网络钓鱼”是那些针对个人的攻击。
blog.163.com
6.
Another common form of social engineering attacks are phishing schemes.
社会工程的另一个常见的形式是网页仿冒(phishing)方式。
www.ibm.com
7.
Unlike many such products, NIS is actually better than the phishing filter built into the browsers.
跟许多这样的产品不同,NIS真的比浏览器内置的反钓鱼过滤强。
www.kafan.cn
8.
Our evaluation result shows that the phishing detector may achieve high accuracy with relatively low false positive and low false negative.
经由实验的结果得知我们的网路钓鱼探测器可以达到很高的精准度并且有较低的误报率以及漏报率。
140.118.33.11:8080
9.
As phishing continues to escalate, the safest course for consumers may be to warn them over the phone.
有鉴于网路钓鱼行为愈发猖獗,透过电话警告消费者或许是最安全的做法。
dictsearch.appspot.com
10.
In April, social networks replaced financial organisations as the top target of phishing attacks, according to data from Kaspersky Lab.
卡巴斯基实验室(KasperskyLab)的数据显示,4月,社交网站取代金融机构,成为钓鱼攻击的头号目标。
www.kekenet.com
1.
Speed Worm Malware Joke Reporter protects against viruses, trojans, spyware, adware, spam, phishing and Internet identity theft.
9下载速度蠕虫恶意玩笑记者盗窃抵御病毒,木马,间谍软件,广告软件,垃圾邮件,网络钓鱼和网络身份。
kondishenprom.info
2.
The sheer volume of spam has soared in Australia, including wide-spread phishing scams purporting to come from leading Australian banks.
纯粹的垃圾邮件数量激增,在澳大利亚,包括广泛的传播网路诈骗的本意是来自领导的澳洲银行。
dictsearch.appspot.com
3.
The purpose of spoofed Web links that are used in phishing schemes is to deceive you into clicking the link.
网络仿冒骗术中使用的欺骗网站链接的目的就是欺骗您单击链接。
office.microsoft.com
4.
It's the latest in a series of phishing scams that have been making the rounds on Twitter lately.
这是最新的一种钓鱼欺诈,最近已经传开了。
www.bing.com
5.
Phishing can be avoided by not clicking on suspect web links and not giving out personal details to unknown online sources, AOL said.
AOL还说,防范“钓鱼”应该做到不点击可疑链接,不轻易向不明网络源透露个人信息。
www.dahe.cn
6.
When it comes to high-tech fraud, one of the most common scams is "phishing" .
所以,当谈到高科技诈骗时,最常见的诈骗方法之一是“网络钓鱼”。
www.chinavalue.net
7.
Blocks spyware distribution sites and fraudulent "phishing" websites that trick you into revealing personal data.
危险网站的检测:阻拦发送间谍软件的站点,和带有欺诈性质的诱惑用户泄露个人数据的钓鱼网站。
original.8844.com
8.
A " phishing scam" is a kind of crime that uses email to trick people into providing financial or other personal information.
一份“诈骗邮件”是一种犯罪,它使用电子邮件来欺骗人民提供财产或者其他私人信息。
voa.hjenglish.com
9.
Beware of the online phishing. Don't submit your information before you make sure that it's secure.
当心网络诈骗的行为,在确认安全无误之前,不要给出你的数据。
www.oyalife.com
10.
Google on Wednesday said 'bad actors' based in the Shandong province city of Jinan were responsible for sending so-called phishing emails.
谷歌周三说,发送所谓钓鱼邮件的“坏人”来自山东济南。
c.wsj.com
1.
In this version, Norton's anti phishing is just as effective but not nearly as large.
在这个版本里,诺顿的反钓鱼效率高,却不乎不能算大。
www.kafan.cn
2.
Beware of phishing. Never purchase products or services by responding to an email. This generally results in your card number being phished.
谨防网络诈骗。绝不通过电子邮件购买产品或服务。这样通常的结果就是你的卡号被骗走了。
www.bing.com
3.
New error pages provide a simplified user experience which helps to mitigate social-engineering and phishing attacks.
新的错误页面提供了一个简单的用户体验帮助用户减少社会工程学和仿冒网站攻击。
www.cnblogs.com
4.
For instance, someone could add a link that mimics the style of the site for phishing purposes (see Resources).
例如,某个人可以添加模仿站点样式的链接以达到欺骗(phishing)目的(请参阅参考资料)。
www.ibm.com
5.
Phishing can carry significant economic costs for the victims and rewards for the perpetrators.
仿冒可以带来巨大的经济损失,给受害者和奖励为肇事者。
www.sjgcz.cn
6.
You can configure the Phishing Filter through the Internet Options Advanced Settings tab.
你通过可以Internet选项中的高级设置页来配置网络钓鱼过滤器。
blog.csdn.net
7.
The exact same attack methodologies are used to make a website host malware or a phishing site.
而制作恶意软件网站和钓鱼网站也采用了一模一样的方法。
www.bing.com
8.
Such targeted 'phishing' expeditions involved sending booby-trapped emails to people who have information a hacker is seeking.
在这种针对特定目标的“钓鱼”攻击中,黑客向拥有其所要信息的人士发送设置了陷阱的电子邮件。
c.wsj.com
9.
Computer security specialist says spear phishing often provides the means for even broader attacks.
电脑安全专家称为鱼叉式网络钓鱼常常为更深的攻击提供指导。
blog.sina.com.cn
10.
Common methods include redirecting a victim 's post or gaining online banking details via 'phishing' scams.
通常的做法是转寄受害人的邮件,或者网络钓鱼。
tr.hjenglish.com
1.
The particularly craven hackers, phishing fraudsters and malware writers ply the trade for cash, not kicks.
特别胆小的黑客、钓鱼诈骗和恶意软件写手通过病毒套取现金而不是击溃电脑。
www.bing.com
2.
As for anti-phishing and malware downloads, there are a number of services that track "bad" sites and warn users off.
对于网络钓鱼和恶意软件下载,要有大量地追踪恶意站点和警告用户远离的服务。
www.bing.com
3.
Phishing: These scams send phony but official-looking email from your bank or financial institution.
网络钓鱼:这些诡计会发送伪造但看起来像来自于你的银行或金融机构的官方邮件。
www.bing.com
4.
Reporting suspicious messages to authorities helps in the effort to combat phishing schemes.
将可疑邮件举报给权威机构有助于侦破网络仿冒骗术。
office.microsoft.com
5.
Phishing Filter can help protect you from phishing attacks, online fraud, and spoofed websites.
仿冒网站筛选可帮助防止仿冒攻击、联机欺诈和欺骗网站。
windowshelp.microsoft.com
6.
"Such scams may contain links or attachments which direct users to phishing or malware-laden sites, " it said.
“这样的骗术中常包含带有附件的链接,会将用户转接到钓鱼或恶意软件网站。”其宣称。
modernchina.blog.163.com
7.
In this paper, we present a heuristic method to determine whether a webpage is a legitimate or a phishing page.
在本论文中,我们提出了一个启发式方法,用来确定一个网页是否是合法的或者是诈骗的。
140.118.33.11:8080
8.
Anti-phishing tools that alert users to suspicious and potentially fraudulent e-mail messages.
可针对可疑和可能具有欺诈性的电子邮件向用户发出警告的反网络仿冒工具。
office.microsoft.com
9.
The typical stuff we're seeing, though, right now: the colored background noise, phishing attacks.
不过我们目前看到的典型情况是:有色背景噪音,网络钓鱼攻击。
www.infoq.com
10.
Phishing site domain names can be changed constantly.
仿冒网站域名,可以不断地改变。
www.sjgcz.cn
1.
Peter Cassidy, a spokesman for the Anti-Phishing Working Group, said phishing first surfaced early this decade and took off in 2003.
彼得卡西迪公司的一位发言人对反仿冒工作组说仿冒出现第一本十年初,起飞于2003年完成。
www.sjgcz.cn
2.
The term had its coming out this week when the FBI called phishing the "hottest, and most troubling, new scam on the Internet. "
本周,联邦调查局称网页仿冒是“因特网上最热门,也是最令人伤脑筋的新诈骗活动”,由此出现了这个词。
news.sina.com.cn
3.
When you browse the web and perform transactionsonline, two security risks to be aware of are malware and phishing.
当你浏览web、进行网上交易时,两大安全风险亟需提防,即恶意软件与网络钓鱼。
www.bing.com
4.
It indicates whether the current site is a known phishing site, a suspected fraud, or a valid site.
它会指明当前网站是不是已知钓鱼网站,或者是疑似诈骗,或者是可以信任的网站。
www.kafan.cn
5.
They also caution about the phishing mails, which install harmful code on user's systems without informing them.
专家还声称钓鱼攻击邮件会在没有任何提醒的情况下,在用户的计算机里安装有害的程序代码。
www.anti-spam.cn
6.
Phishing is when fake websites lure people into giving such details as login names or bank accounts.
网络钓取资料的作法,是用假的网站引诱人交出像是登入名称或银行帐户等详细资料。
times.hinet.net
7.
The honeypot technology has played the very major role in analysising Phishing attacks and tracking BotNets.
蜜罐技术在追踪钓鱼网络、僵尸网络等方面发挥了很大的作用。
dictsearch.appspot.com
8.
Another well-crafted phishing scheme duped a group of defense contractors.
另一个精心策划的钓鱼计划诱骗了一群国防承包商。
c.wsj.com
9.
James Mulvenon, a China and cyber-security expert, has been tracking a four-year phishing campaign against China specialists in Washington.
中国研究及网络安全专家毛文杰(JamesMulvenon)一直在跟踪针对华盛顿中国研究专家的为期四年的一起钓鱼行动。
c.wsj.com
10.
In some cases, organizations involved in phishing attacks were contacted directly, or the incident data was forward to the local CERT .
在一些案例中,我们与被涉及网络钓鱼攻击的组织进行了直接联系,或者将这些攻击相关的数据转交给当地的应急响应组织。
dictsearch.appspot.com
1.
The hackers used a technique that is sometimes known as "executive spear phishing. "
骇客使用通常被称为“高级鱼叉式网路钓鱼”的技术。
www.bing.com
2.
The company also needs to find a way to address the rise of spam, phishing, and malware on the site.
该公司还继续寻找有效的方法来应对网站出现的垃圾信息、网络钓鱼以及恶意软件。
www.bing.com
3.
Here's a little more information from ComputerWorld, about how to avoid a phishing scam.
这是来自《计算机世界》的关于如何避免网络欺诈的一点更多的信息。
www.bing.com
4.
Around 5% of users sign up here just to start hacking or phishing websites or causing other problems.
签署约5%的用户在这里刚开始黑客或钓鱼网站,或引起其他问题。
wenwen.soso.com
5.
Phishing attacks use fraudulent websites and emails that mimic well-known organizations in order to trick unsuspecting Internet users.
钓鱼攻击使用欺骗性网站和电子邮件模仿著名的组织,以诱骗不知情的互联网用户。
xtdownload.com
6.
Some reputable companies provide free tools that may alert you if a website is a known phishing site or is used to distribute spyware.
一些信誉良好的公司会提供免费工具,当你进入了某已知的钓鱼网站或传播间谍软件网站时发出警告。
www.yiai.org
7.
Help protect your e-mail accounts from harmful phishing scams.
帮助保护电子邮件帐户避免接收有害的仿冒欺诈邮件。
www.microsoft.com
8.
Despite high-profile examples of internet security breaches, such as the recent incident of phishing email scams.
尽管互联网安全隐患重重,比如最近发生的多起网络钓鱼邮件和垃圾邮件。
www.tooben.com
9.
On a small scale the internet can harm individuals through a spot of phishing; it can also absorb your identity.
因特网可在小范围内通过网络诈骗破坏个人电脑;它也能窃取你的隐私。
www.bing.com
10.
What exactly are phishing and malware attacks?
那么,网络钓鱼与恶意软件攻击究竟是什么?
www.bing.com
1.
Phishing is the malicious practice of luring you into disclosing your personal information, such as your bank account number and password.
网络仿冒是一种引诱您泄露个人信息(如银行帐号和密码)的恶意行为。
office.microsoft.com
2.
"It's a big problem and getting worse, " says Dave Jevans, chief executive of IronKey and chair of the Anti-Phishing Working Group.
“这是个不断加重的大问题,”戴维·杰文斯表示,他是Ironkey公司的董事长,同时也是反钓鱼工作组的负责人。
www.bing.com
3.
Phishing has become very common phenomenon, and State enterprises as proprietary technologies such as screen mesh given disclosure.
仿冒成为非常普遍的现象,国营企业的专有技术如筛网一样一点一滴地向外泄露。
www.bing.com
4.
Approximately 53 percent of reported incidents in 2010 were phishing attacks.
在2010年,约53%的事件报告为钓鱼攻击。
www.etiri.com.cn
5.
As many as 95 billion phishing emails were in circulation in 2010.
2010年一年中就有9.5亿伪冒电邮在网络世界中传播。
space.cnblogs.com
6.
The P100 stamp indicates that the message contains a URL that is present in a phishing definition file.
P100标记指示邮件包含一个在冒仿定义文件中出现的URL。
technet.microsoft.com
7.
Related: Can you spot a cleverly disguised phishing e-mail?
相关信息:你能否找到巧妙伪装的网络钓鱼电子邮件?
www.elanso.com
8.
Hackers used a phishing attack last year to spread a malicious virus known as Koobface (a reference to Facebook).
去年黑客通过钓鱼袭击的方式,利用Facebook传播了一个叫做Koobface的恶意病毒。
www.bing.com
9.
I'm Lee LeFever and this has been Phishing Scams in Plain English.
这就是钓鱼诈骗,我是《原来如此》的李勒菲弗。
www.hjenglish.com
10.
A phishing e-mail has been detected.
已检测到网络钓鱼邮件。
bbs.360safe.com
1.
It's called "phishing" because the badguys throw out electronic bait and wait for someone to bite.
称之为“网络钓鱼”的原因在于,那些坏家伙抛出了电子诱饵,等着有人上钩。
www.bing.com
2.
1 in 445 emails are phishing emails.
在445份邮件中就有1份是伪冒电邮。
space.cnblogs.com
3.
Spear phishing on the other hand is not normally targeting the random individual.
鱼叉式网络钓鱼的不同之处则在于它并不以随机目标为对象。
wenwen.soso.com
4.
Some 51, 000 'phishing' attacks were recorded last year, up 16 per cent on the previous year.
据记录结果显示,去年约有五万一千个“网络钓鱼”攻击,较前年相比上升了16%。
gb.cri.cn
5.
Zscaler protects users against a range of threats, including bots, phishing and malicious active content. Zscaler
抵御各种威胁,包括机器人,网络钓鱼和恶意活动内容的用户。
zhidao.baidu.com
6.
Tech giants including Google, Facebook, Microsoft and Yahoo are joining forces to tackle email spam and phishing attacks,
谷歌、脸谱、微软和雅虎等高科技巨头准备联手解决垃圾邮件和网络钓鱼的问题。
www.bing.com
7.
Typical characteristics of a phishing scheme
网络仿冒骗术的典型特征
office.microsoft.com
8.
The computer may respond very slowly as the Phishing Filter evaluates Web page contents in Internet Explorer 7
仿冒网站筛选评估InternetExplorer7中的网页内容时,计算机的响应速度可能非常慢
support.microsoft.com
9.
The Harm of Phishing and Its Precautionary Measures
网络钓鱼的危害及防范措施
www.ilib.cn
10.
Examples and characteristics of phishing schemes
网络仿冒骗局的示例和特征
office.microsoft.com
1.
Online detection and prevention of phishing attacks
网络钓鱼攻击的在线检测及防治
ilib.com.cn
2.
Helping to protect your computer against phishing
保护计算机免受仿冒网站的侵害
windowshelp.microsoft.com
3.
Wave of Phishing Attacks Hit Regional Banks, Credit Unions
网页篡改攻击的浪潮已波及地区银行和信用合作组织
www.acsi.gov.cn
4.
New Phishing Attacks Eliminate Need for Target Web Site
新的网页篡改攻击已不需要目标网站
www.acsi.gov.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/27 11:40:16