phishing是什么意思   phishing怎么读

英式:[ˈfɪʃɪŋ]    美式:[ˈfɪʃɪŋ]

phishing单词基本解析:

网络仿冒
n.网络钓鱼(通过互联网或电邮骗取他们身份证件、银行账号等以盗取金钱)
释义网络仿冒;

phishing变化用词:



phishing英英释义:

PhishingPhishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.Van der Merwe, A J, Loock, M, Dabrowski, M.

以上来源于:Wikipedia

phishing中文词源:

phishing用法和例句:

phishing


The 2007 Microsoft Office system helps to mitigate these risks to help protect you from homograph attacks used in phishing schemes.

2007 Microsoft Office System有助于降低这些风险以帮助您抵御仿冒骗术中使用的形似字攻击。


The protection measures aim to prevent AOL members from falling for phishing scams by blocking access.

AOL所提供的保护手段,就是通过阻止对‘钓鱼’网站的访问而使其用户免遭毒手。


Phishing att ...

Hotmail曝逾万密码.


How Office helps protect you from phishing schemes

Office如何帮助您防御网络仿冒骗局


The P100 stamp indicates that the message contains a URL that is present in a phishing definition file.

P100标记指示邮件包含一个在冒仿定义文件中出现的URL。


phishing attacks

phishing攻击


SP2 contains a new Phishing Protection feature to be used with the Outlook Junk Email Filter.

SP2包含新的网络仿冒保护功能,可以与Outlook垃圾邮件筛选配合使用。


“The sheer volume of spam has soared in Australia, including wide-spread phishing scams purporting to come from leading Australian banks.

“纯粹的垃圾邮件数量激增,在澳大利亚,包括广泛的传播网路诈骗的本意是来自领导的澳洲银行。


In the event of a phishing scam to virus infection, will begin to flow down the value chain to contagious.

一旦仿冒病毒感染了某个产品,就会顺着价值链往上传染,无一幸免。


Similar to phishing, smishing uses cell phone text messages to deliver the "bait" to get you to divulge your personal information.

与网络钓鱼方式类似,短信诈骗通过手机文字信息放“饵”以诱使你泄露个人信息。


For phishing attacks, Microsoft is rolling out Smart Screen, a filter which is designed to screen out known phishing URLs.

为钓鱼式攻击,微软推出了智能画面中,过滤器,目的是为了筛选出已知的钓鱼式攻击的网址。


The innocence of humans [gullibility?] That allows criminals to trick them into installing malware on their machines, responding to phishing attacks, etc.

人的纯真[易受骗?]易受罪犯哄骗而在机器上安装恶意软件,响应网络钓鱼攻击,等等。


They're replacing much of the older code to increase performance and make the code base more modular, able to handle new security threats like phishing.

他们取代许多旧典,以提高性能,使代码更加模块化,能应付新的安全威胁,如钓鱼。


He says recent phishing attempts actually warn customers about phishing and ask them to update their information for security reasons.

他指出,最近的网路钓鱼手法事实上还会警告顾客注意网路钓鱼,要求他们基于安全理由更新个人资料。


On the PC, the early viruses were eventually joined by Trojans, worms, spyware and most recently phishing attacks.

以个人电脑为例,最早的病毒诞生之后,就陆续出现特洛伊木马、蠕虫、间谍软体,到现在最新的钓鱼攻击。


Phishing can carry significant economic costs for the victims and rewards for the perpetrators.

仿冒可以带来巨大的经济损失,给受害者和奖励为肇事者。


Phishing typically involves sending fraudulent e-mails that include links that direct recipients to fake websites where they are asked to input sensitive data.

仿冒通常涉及欺诈发送电子邮件,其中包括联系,直接受助假冒网站,让他们有问输入敏感数据。


But he said people should not rely on it, as it will not be able to detect all phishing sites.

但用户不应该完全依赖这个软件,因为它无法诊断出所有全部含有“网络钓鱼”恶意代码的网站。


Do you want to turn on the phishing filter?

你愿意打开反网络钓鱼过滤功能么?


You can configure the Phishing Filter through the Internet Options Advanced Settings tab.

你通过可以Internet选项中的高级设置页来配置网络钓鱼过滤器。


"My motivation is to be a good citizen and put a dent in phishing scams",says Peisner,president of an anti-phishing service.

佩斯纳说:“我的动机是要做一个好公民,致力于打击网络钓鱼诈骗案。”由他担任总裁的公司提供反网络钓鱼服务。


* Fixed an issue where the phishing and malware database did not update on first launch.

修复了在第一个版本的网络钓鱼和恶意软件的数据库没有更新就发布的问题,。


From the artist:"The former Phish bassist assimilates free-form rock&roll, calypso, pop and funk, showcasing an unexpected side to his songwriting."

免责声明:本站数据全部由蜘蛛程序自动抓取而来,且仅提供文章链接及部分摘要信息,文章所持观点和本站无关,请点击原文链接查看原作者和出处!


Also said: "I walk out, you first phishing.

又说道:“我出去走一走,你们先钓鱼。”


Phishing attacks can result in a user divulging sensitive information, including financial information, that can result in a loss of privacy or money.

受到网络仿冒攻击的用户可能会泄露敏感信息(包括金融信息),导致隐私或财产遭到侵害。


In addition, phishing tools often appear to be downloaded from a number of regularly updated central web or FTP servers.

另外,网络钓鱼攻击工具经常可以从一些经常更新地中央网站服务器或FTP服务器上下载获得。


At the same time also opposed to phishing and malicious software protection.

同时还包括反对网络钓鱼和恶意软件的保护功能。


For that reason, my research group at Carnegie Mellon University is studying the best ways to teach people to recognize and avoid phishing scams.

因此,我在美国卡内基美伦大学的研究团队,正在研究教导大家辨认并避开网钓邮件的最佳方式;


In the To line, type the e-mail address of the company to whom you are reporting the phishing message.

在“收件人”行中,键入您要向其举报网络仿冒邮件的公司的电子邮件地址。


In some cases, organizations involved in phishing attacks were contacted directly, or the incident data was forward to the local CERT .

在一些案例中,我们与被涉及网络钓鱼攻击的组织进行了直接联系,或者将这些攻击相关的数据转交给当地的应急响应组织。


Following this brief introduction to the concepts of phishing, we will now review the actual techniques and tools we have captured during phishing attacks observed in the wild.

在这个简要介绍网络钓鱼概念的引言之后,我们将开始回顾在我们观察到的真实网络钓鱼攻击中所实际使用的技术和工具。


The Junk E-mail Filter also automatically evaluates each incoming message to discover whether it might be suspicious, potentially fraudulent, or part of a phishing attack.

垃圾电子邮件筛选也会自动评估每个传入的邮件以确定其是否可疑、是否具有潜在欺诈性或是否是phishing攻击的一部分。


Some phishing emails threaten a dire consequence if you don't respond.

如果你不回应,一些“网络钓鱼”电子邮件还以可怕的后果恐吓你。


Pharming has been called “phishing without a lure.

它被叫做“无诱饵的钓鱼”。


It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.

它还保护了公共密钥不能被篡改,从而防止网络欺诈,欺骗,和篡改代码的攻击。


Install this update for Windows Mail to revise the definition files used to detect e-mail messages that should be considered junk e-mail or that may contain phishing content.

安装本Windows Mail更新程序可修改在检测垃圾邮件或可能包含仿冒内容的电子邮件时将用到的定义文件。


This update resolves a performance issue with the Internet Explorer Phishing Filter when visiting web pages that contain multiple frames or when multiple frame navigations occur quickly.

安装此更新可解决造访多框架网页或多框架浏览迅速发生时,Internet Explorer网路钓鱼筛选器可能发生的效能问题。


Through both laboratory and field studies, we have shown that the game makes a significant difference in users' ability to identify phishing sites.

实验室与实际研究显示,这个游戏明显提升了使用者辨识钓鱼网站的能力。


The general belief of SSL providing security is precisely why many of the newer phishing scams that use SSL are tricking people into giving up personal information.

对SSL提供安全的普遍信心正好是为什么一些新网络钓鱼诡计使用SSL哄骗人们放弃个人信息的原因。


In any phishing attack scenario, it is the social engineering skills of the perpetrator, which determine the phishing attempts' success rate.

对于任何一个一般的钓鱼攻击来说,成功概率的高低决定于犯罪者运行社会工程学技能的好坏(因此实际成功的几率并不高)。


Most persons have been warned numerous times about phishing attempts trying to trick them into revealing user names / passwords to banks etc.

对于尝试通过欺骗行为以使用户暴露其银行帐户等用户名/密码的网络钓鱼来说,多数人已经受到过警示。


Compares URL addresses with the phishing database.

将URL地址和网络钓鱼数据库中地址进行比较。


Configuring the fake phishing web site to record any input data that the user submits (such as usernames and passwords), silently log them and then forward the user to the real web site.

将假冒的钓鱼网站配置成记录用户提交的所有数据并进行不可察觉的日志,然后将用户重定向到真实的网站。


A few sites provided good background to raise awareness of the phishing threat but little in the way of actionable advice about how people could protect themselves.

少数网站虽然提供良好背景知识,提升了大家对网钓威胁的警觉心,但对于如何保护自己没什麽具体建议。


Despite high-profile examples of internet security breaches, such as the recent incident of phishing email scams,

尽管互联网安全隐患重重,比如最近发生的多起网络钓鱼邮件和垃圾邮件,


A phishing e-mail has been detected.

已检测到网络钓鱼邮件。


A common online phishing scam starts with an e-mail message that appears to come from a trusted source but actually directs recipients to provide information to a fraudulent website.

常见的联机网页仿冒现象是首先收到一封电子邮件,该邮件似乎来自受信任的源但实际上会将收件人指引到欺骗性网站并诱使其提供相关信息。


Scams involving the design and hosting of fake webpages for phishing attempts, as well as the “mailer” applications used to send phishing e-mails, are also popular.

干系到设计的欺诈、为进行网络钓鱼而布置的虚假网页以及通常会发送“钓鱼”邮件的“邮件群发”程序同样都是非常流行的手段。


And, across the industry, Microsoft is working to reduce spam and phishing attacks by developing technology to authenticate the identity and reputation of email senders.

并且,微软在业界正致力于开发减少垃圾邮件和网络钓鱼攻击的新技术用以鉴别邮件发出者的身份和信誉度。


The programs that used a combination of blacklists and heuristics fared much better, with one detecting almost 90 percent of phishing attacks from the beginning of our test.

并用黑名单和经验法则程式的表现则好多了,其中一种在测试一开始就能侦测到将近九成的网钓攻击。


The application's components also enable users to protect their computers against currently unknown threats and phishing, and to restrict users' access to the Internet.

应用程序的组成部分还使用户能够保护自己的计算机免受目前未知的威胁和网络钓鱼,并限制用户的上网。


" When the potential victim clicks on the e-mailed link, the redirector checks all the phishing sites, identifies which are still live, and invisibly redirects the user to one.

当受害者点击这些链接后,重定向系统就会检查所有的诈骗站点,找出其中仍然有效的链接,然后诱使受害者访问这些站点。


Peter Cassidy, a spokesman for the Anti-Phishing Working Group, said phishing first surfaced early this decade and took off in 2003.

彼得卡西迪公司的一位发言人对反仿冒工作组说仿冒出现第一本十年初,起飞于2003年完成。


A number of phishing attacks also surged up .in June.

很多钓鱼式的攻击也迅速增长。


Our group also develops automatic filters that can identify likely phishing attacks.But in this work, too, we have found that human responses can be critical to a filter's success.

我们团队也研发了自动过滤器,能辨识可疑的网钓攻击,但在研发过程中,我们发现使用者的反应才是过滤器成功与否的关键。


In my latest test NIS blocked 94 percent of the phishing sites, IE blocked 83 percent , and Firefox blocked 77 percent .

我在最近的测试中,NIS阻止了94%的钓鱼网站,IE阻止了83%,火狐阻止了77%。


Warm Reminder: Be careful! Phishing emails are spreading again.

提提您:请各位小心,欺诈邮件再次出现!


Abstract: With the development of internet,as one form of network cheats,phishing has brought a great deal of economy loss to enterprise and individual user.

摘 要: 随着网络应用的迅速普及,“网络钓鱼”形式的网络欺诈案件给不少企业和个人用户带来了巨大的经济损失。


Phishing attack is growing significantly each year and is considered as one of the most dangerous threats in the Internet which may cause people to lose confidence in e-commerce.

摘要:网路钓鱼攻击每年都以惊人的速度增长,目前在网路上已成为最危险的威胁之一,这可能会使某些人对于电子交易失去信心。


New Phishing Attacks Eliminate Need for Target Web Site

新的网页篡改攻击已不需要目标网站


Pharming is more insidious than the better-known phishing scam because a pharm redirects a user’s request for a legitimate URL to a phony Web site.

无诱饵欺骗比更出名的钓鱼式欺骗还要阴险,因为无诱饵欺骗将用户对合法URL(网址)的请求转到假冒的网站。


As early as last December, Symantec began monitoring to the Beijing Olympics-related phishing spam.

早在去年12月,赛门铁克便开始监测到与北京奥运相关的网页仿冒垃圾邮件。


As phishing continues to escalate,the safest course for consumers may be to warn them over the phone.

有鉴于网络钓鱼行为愈发猖獗,通过电话警告消费者或许是最安全的做法。


As phishing continues to escalate, the safest course for consumers may be to warn them over the phone.

有鉴于网路钓鱼行为愈发猖獗,透过电话警告消费者或许是最安全的做法。


-- China's largest 3 C shopping mall site Jing-dong of the Customer Service Department staff recently Youdian Fan, the original phishing sites targeting them.

本报讯 国内最大的3C购物网站京东商城客服部的工作人员最近有点烦,原来钓鱼网站盯上了他们。


Phishing - the act of falsifying the identity of a known brand or organisation to steal personal details - is one of the biggest threats to personal online security, according to AOL.

根据AOL统计,网络钓鱼即假借知名公司的名义对电脑用户进行诈骗,盗取用户个人信息的行为是个人网络安全的最大威胁。


There is also new protection against phishing (the use of fraudulent e-mail messages that might trick you into divulging personal information).

此外,还有一种新的网络仿冒(使用欺诈性电子邮件诱使您透露个人信息)防范功能。


When the phishing e-mails go out, all include a link to yet another site, a "central redirector.

然后诈骗者发出钓鱼邮件,它们都包含一个实际上指向其它站点的链接。


Not all phishing e-mails contain these features, however, and sometimes legitimate e-mails contain them as well.

然而并非所有网钓邮件都具有这些特徵,有时合法邮件也有这些特徵。


The particularly craven hackers, phishing fraudsters and malware writers ply the trade for cash, not kicks.

特别胆小的黑客、钓鱼诈骗和恶意软件写手通过病毒套取现金而不是击溃电脑。


The screening software, which is based on the phishing filter in IE7, will sport improved heuristics and the ability to analyze entire URL strings for phishing site detection.

甄别软件,该软件是基于仿冒网站筛选在IE7中,将体育的启发式检测和改进的能力,分析整个URL字符串为钓鱼网站检测。


Since most of the phishing emails come through spam, get a spam filter and install on your computer.

由于大部分的垃圾邮件,通过网络钓鱼电子邮件来,得到你的电脑安装垃圾邮件过滤.


With so much at stake, the computer security community has been scrambling to develop technologies to combat phishing, such as filters for e-mail and Web browsers that flag phishing attempts.

由于影响重大,电脑安全界已积极发展防制网钓的技术,例如电子邮件过滤器,以及在网页浏览器中标示出网钓企图。


As the SAR government has adopted a series of measures and actions, which at that time be used for spam and phishing domain should no longer exists.

由于特区政府采取了一系列措施和行动,那些当时被用于滥发讯息和仿冒诈骗的域名应该已不存在。


Related: Can you spot a cleverly disguised phishing e-mail?

相关信息: 你能否找到巧妙伪装的网络钓鱼电子邮件?


Spoofing is the phone industry's version of phishing, in which criminals use fake e-mails to fool computer users into divulging personal information.

窜改来电显示是网络钓鱼的电信业版本,而网络钓鱼是指歹徒伪造电子邮件,让电脑用户泄漏个人资料。


Vishing An ingenious new type of phishing scam that uses VoIP telephony to entrap its victims is emergered.

网上话音欺骗一种刚刚出现的颇有创意的网上钓鱼式欺骗新类型,它利用IP电话诱骗受害者。


Phishing is the malicious practice of luring you into disclosing your personal information, such as your bank account number and password.

网络仿冒是一种引诱您泄露个人信息(如银行帐号和密码)的恶意行为。


Phishing is the luring of sensitive information through e-mail, such as passwords and other personal information, by an attacker masquerading as someone trustworthy.

网络仿冒是指攻击者伪装成某个可信赖的身份,通过电子邮件骗取敏感信息(例如密码和其他个人信息)。


Often phishing messages have deceptive links that actually take you to spoofed Web sites that urge you to enter and submit your personal information.

网络仿冒邮件通常包含欺骗性链接,它们会带您进入欺骗网站,然后催促您输入并提交您的个人信息。