网站首页  词典首页

请输入您要查询的英文单词:

 

单词 phishing
释义

Examplesofphishing

phishing
Similarly, an individual could accidentally ' 'leak' ' his or her own data through a ' 'phishing' ' attack or other online breach.
From theCambridge English Corpus
Password managers can also be used as a defense againstphishingand pharming.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Simple homographic matching of domain names has resulted inphishingattacks where a domain can appear to be legitimate, but is not.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
In contrast, an uninformed employee is susceptible to malware,phishingattacks, and other forms of social engineering.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Phishingemails may contain links to websites that are infected with malware.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
A similar technique can be used to solve thephishingproblem.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Personal information used inphishingattempts may be associated with spyware.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Phishingusually involves seemingly official electronic notifications or messages, such as e-mails or instant messages.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Protection is also granted through analyzing the behavior of known menaces in such a way that staying safe fromphishingactivities is a childs.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
When enabled, every website the user visits is checked against a master list of knownphishingsites.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Internet users may see fast flux used inphishingattacks linked to criminal organizations, including attacks on social network services.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Others have used the confusion inphishingattempts.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
The tougher certificates, coupled with browser developments, could help fightphishing, which threatens the multi billion dollar online retail market.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Smartphones are also victims of classic piracy related to the web:phishing, malicious websites, etc.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
Others can hostphishingor money mule recruiting websites.
From
Wikipedia
Creatives commons iconThis example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
#https://dictionary.cambridge.org//dictionary/english/phishing##
随便看

 

英汉词典包含213609条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。

 

Copyright © 1999-2024 qbania.com All Rights Reserved
更新时间:2024/12/27 22:19:36