[网络] 信息基础设施;基础建设;基础建设计画

North Korean cyber operatives, like the Lazarus Group, have been linked to computer system infiltrations like the 2014 Sony Pictures hack, prior to the release of the film The Interview and the 2016 attempted theft of close to one billion dollars fro

发表于:2018-11-29 / 阅读(402) / 评论(0) 分类 VOA标准英语2018年(十一月)

Washington Lacks Consensus on Russian Hacking 华盛顿对俄罗斯黑客缺乏共识 WASHINGTON Washington continues to speak with a cacophony of voices on Russian meddling in last months U.S. presidential election, displaying a lack of consensus du

发表于:2018-12-08 / 阅读(129) / 评论(0) 分类 VOA标准英语2016年(十二月)

It begins with a simple USB Key, then with surgical precision, penetrates some of the world's most advanced computer security. The first cyber weapon, say experts, to threaten to damage targets in the real world. Cyber strategist like Gadi Evron say

发表于:2018-12-11 / 阅读(171) / 评论(0) 分类 万花筒2010年

Britain Invests Billions in Cybersecurity in Face of Russian Threat 英国投资数十亿资金应对俄罗斯在网络安全方面的威胁 LONDON Britain says it will spend more than $2 billion on cybersecurity and recruit 1,000 more intelligence o

发表于:2018-12-16 / 阅读(251) / 评论(0) 分类 VOA标准英语2016年(十一月)

Businesses Struggle to Keep Up in Fight Against Cyberattacks NEW YORK Cybersecurity criminals are more sophisticated, bold and resilient than ever, according to a new study by U.S. computer networking company Cisco, which revealed major flaws in busi

发表于:2018-12-16 / 阅读(123) / 评论(0) 分类 VOA标准英语2016年(一月)

MARGARET WARNER:We turn to a new cyber campaign against American banking giants and growing worries about what they might foreshadow. It began late last month and continues to this day. Two more U.S. banks are the latest targets in the spate of cyber

发表于:2018-12-31 / 阅读(179) / 评论(0) 分类 PBS访谈商业系列

More Than 5 Million Cyber Attacks in Kenya 肯尼亚去年发生五百多万次网络攻击 There were 5.4 million cyber-attacks recorded last year in Kenya. That is more than double the number recorded in 2013. 去年,肯尼亚记录到540万起网络

发表于:2019-01-08 / 阅读(188) / 评论(0) 分类 2015年VOA慢速英语(七)月

US Takes Action Against Cyber Theft Threat From VOA Learning English, this is the Technology Report in Special English. The United States has announced a plan to fight the quickly growing threat from cyber spies and Internet attackers known as hacker

发表于:2019-01-12 / 阅读(143) / 评论(0) 分类 2013年VOA慢速英语(五)月

AS IT IS 2016-08-22 Hacking the U.S. Election 'Possible' But Difficult, Experts Say As recently as 2014, people could use WiFi to connect to voting machines inside certain voting places in the state of Virginia. They simply had to be nearby. Once con

发表于:2019-01-12 / 阅读(145) / 评论(0) 分类 2016年VOA慢速英语(八)月

Britain on Tuesday announced plans to cut the country's defense budget that include losing thousands of troops and slashing weapons programs. British allies are concerned that the cuts might affect the country's status as a global power. British Prim

发表于:2019-01-14 / 阅读(169) / 评论(0) 分类 VOA标准英语2010年(十)月

The commander of the new U.S. Cyber Command, Army General Keith Alexander, said the Pentagon's vast computer system is probed by potential enemies a quarter-of-a-million times every hour and needs to be protected, especially in a time of war. Alexand

发表于:2019-01-14 / 阅读(145) / 评论(0) 分类 VOA标准英语2010年(九)月

互联网安全公司努力应对威胁 HOUSTON Bomb attacks typically grab news headlines. But there are almost invisible activities occurring every day that could create a more widespread and devastating calamity cyber intrusions into government an

发表于:2019-01-14 / 阅读(168) / 评论(0) 分类 VOA标准英语2015年(七月)

DAVID GREENE, HOST: The United States and the U.K. issued this rare joint alert last week warning that Russia is actively preparing for a future cyberwar against the West. Jeanette Manfra is the Department of Homeland Security's cybersecurity chief,

发表于:2019-01-16 / 阅读(149) / 评论(0) 分类 2018年NPR美国国家公共电台4月

Internet experts warn that the Worldwide Web has become a haven for organized crime and they say the threat of online terrorism is real. At a recent e-crime congress in London, a NATO official said online espionage and Internet-based terrorism repres

发表于:2019-01-19 / 阅读(138) / 评论(0) 分类 VOA双语新闻 2008年4月

CYBERSPACE enables fast communications, electricity grids, international banking and military might. While we cant live without the Web, its very openness has made individuals, organizations and even nations targets in this new era of cyber warfare. 网

发表于:2019-01-19 / 阅读(141) / 评论(0) 分类 中英双语新闻

In his speech, President Xi put forward 5 proposals to achieve the goal, such as speeding up the construction of a global cyber infrastructure and promoting inter-connectivity, building an online platform for cultural exchanges and mutual learning, p

发表于:2019-01-19 / 阅读(185) / 评论(0) 分类 2015CRI中国国际广播电台

By Deborah Tate Capitol Hill 04 August 2006 Among the last issues to come before the U.S. Senate before lawmakers began their August recess were cybercrime and cybersecurity. Senators ratified an international treaty aimed at cracking down on crimes

发表于:2019-02-05 / 阅读(248) / 评论(0) 分类 2006年VOA标准英语(八月)

US launches cyber security plan 美国实施网络安全计划 Barack Obama: Our digital infrastructure will be treated as a strategic national asset US President Barack Obama has announced plans for securing American computer networks against cyber attacks.

发表于:2019-02-08 / 阅读(146) / 评论(0) 分类 英语新闻

WASHINGTON, Feb. 12 (Xinhua) -- U.S. President Barack Obama on Tuesday signed an executive order to boost cyber security of critical infrastructure by strengthening cooperation between the government and the private sector. The executive order increa

发表于:2019-02-11 / 阅读(182) / 评论(0) 分类 英语新闻

The Chinese foreign ministry has issued a new statement, calling the hacking allegations groundless criticism, dubbing it irresponsible and unprofessional. The latest comments come following a report by a U.S. computer security company, which is accu

发表于:2019-02-21 / 阅读(247) / 评论(0) 分类 英闻天下
学英语单词
a.cacatuoides
abaxial side
abdominal air-sac (or abdominal sac)
absurdness
Allardia stoliczkae
alternative division ring
amount differ
anchimetamorphic zone
arc-welders' eye-flash
autocatalysis
B movie
bailamos
beam electronic current
bed of justice
bipolar coding
cause-and-effects
closed-circuit working
comptroller
conflate
consumptionish
cordones
cytomorphosis
docking bracket
doctrines
electro-polarized relay
epithelial pegs
eristalinus lugens
exit visa
field sweep mode
film makings
fluecured
formating
former trial
fragmentation threshold
function of exchange
gob rope
gravitational singularities
grease someone's hand
Grey Lady
haemofiltrations
hankwitz
hardware-accelerated
hexachloropalladate
hoe bucket
image coordinate system
IS (interval signal)
isopical deposit
lashings-out
loinss
louse something up
low-contrast
maltosazone
medium signal eode
meralgia
metal-insulator-semiconductor laser
mogging
molding flask
motor paralysis
mucosa aerosol
multi media
myrmekite
navicula carinifera
nonsynonymous
offend by
ore-salt mixture
overroad stay
pinafore
propoxyphenes
protected seam
pushdown queue
raffone
rail relaying machine
rotor-resistance starter
salix herbaceas
screaming-meemies
seat surface
seazement
shake dancer
single-entry pump
Sinnūris
sleep with them
Slovenia
smugging
spatter-lash
srts
standard electrode potential
steatorrh(o)ea
stir coals
subscript origin
superconducting winding
supramostoid
swindell
terminal guidance
Through the Looking-Glass
ultra-high-pressure valve
umbillical circulation
under the instructions from
urticaceous
vapourization coefficient
vestels
well-known trademark
yufts