[网络] 攻击

Experts Say More Research Needed to Foil Cyber It doesnt matter who you are or where you live - if you have access to a computer, you are a potential target for cyber criminals. And its not just individuals at risk. Earlier this month, U.S. Attorney

发表于:2018-12-08 / 阅读(73) / 评论(0) 分类 VOA标准英语2013年(五月)

Businesses Struggle to Keep Up in Fight Against Cyberattacks NEW YORK Cybersecurity criminals are more sophisticated, bold and resilient than ever, according to a new study by U.S. computer networking company Cisco, which revealed major flaws in busi

发表于:2018-12-16 / 阅读(57) / 评论(0) 分类 VOA标准英语2016年(一月)

MARGARET WARNER:We turn to a new cyber campaign against American banking giants and growing worries about what they might foreshadow. It began late last month and continues to this day. Two more U.S. banks are the latest targets in the spate of cyber

发表于:2018-12-31 / 阅读(84) / 评论(0) 分类 PBS访谈商业系列

More Than 5 Million Cyber Attacks in Kenya 肯尼亚去年发生五百多万次网络攻击 There were 5.4 million cyber-attacks recorded last year in Kenya. That is more than double the number recorded in 2013. 去年,肯尼亚记录到540万起网络

发表于:2019-01-08 / 阅读(107) / 评论(0) 分类 2015年VOA慢速英语(七)月

BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas

发表于:2019-01-11 / 阅读(85) / 评论(0) 分类 英语新闻

US Takes Action Against Cyber Theft Threat From VOA Learning English, this is the Technology Report in Special English. The United States has announced a plan to fight the quickly growing threat from cyber spies and Internet attackers known as hacker

发表于:2019-01-12 / 阅读(64) / 评论(0) 分类 2013年VOA慢速英语(五)月

AS IT IS 2016-02-01 Businesses Weak on Cyber-Crime Protection 企业在网络犯罪防御上表现软弱 A new report says businesses around the world are not keeping up with the new and increasingly tricky methods of cyber criminals. The internation

发表于:2019-01-12 / 阅读(76) / 评论(0) 分类 2016年VOA慢速英语(二)月

The U.S. Defense Department is in the final stages of creating a new military command to defend against attacks on the nation's military computer systems. We report from the Pentagon on plans for U.S. Cyber Command. Deputy Secretary of Defense Willi

发表于:2019-01-13 / 阅读(98) / 评论(0) 分类 VOA标准英语2009年(六月)

Computer hackers used to be mostly sophisticated criminals, high tech spies or new media pranksters. But now a new breed of hacker is engaged in what some call a cyber war of political activism. In the streets of New York, these supporters of the Wik

发表于:2019-01-13 / 阅读(65) / 评论(0) 分类 VOA标准英语2010年(十二)月

A new OECD Cyber Security study by British professors says cyber weaponry will be used routinely in future wars. The study says computer attacks on their own will not necessarily constitute a threat, but a coordinated attack - or in combination with

发表于:2019-01-14 / 阅读(101) / 评论(0) 分类 VOA标准英语2011年(一月)

Cyber Threat Top Concern for NATO Cyber attacks on corporations and governments are no longer unusual. Suspects and their computers are hauled away on a regular basis. That's why Admiral James Stavridis sees cyber security as the top challenge for hi

发表于:2019-01-14 / 阅读(87) / 评论(0) 分类 VOA标准英语2013年(五月)

Cyber War for US, Syria? 美国,叙利亚存在网络战争? WASHINGTON The Syrian government and its allies are widely believed to be using cyber attacks to target members of the opposition. Meanwhile, the Obama administration reportedly has been

发表于:2019-01-14 / 阅读(78) / 评论(0) 分类 VOA标准英语2014年(三月)

CYBERSPACE enables fast communications, electricity grids, international banking and military might. While we cant live without the Web, its very openness has made individuals, organizations and even nations targets in this new era of cyber warfare. 网

发表于:2019-01-19 / 阅读(81) / 评论(0) 分类 中英双语新闻

Internet security 网络安全 An anonymous foe 幽灵般的敌人 Hackers hit big companies, the IMF and the headlines 网络黑客席卷名企和国际货币基金组织,大出风头 Jun 16th 2011 | SAN FRANCISCO | from the print edition DEFENCE

发表于:2019-01-26 / 阅读(127) / 评论(0) 分类 经济学人综合

BEIJING, March 11 (Xinhua) -- A Foreign Ministry spokeswoman on Monday said China would like to work with other countries to curb cyber attacks. The Chinese government resolutely opposes and has cracked down on hacking in accordance with the law and

发表于:2019-02-08 / 阅读(84) / 评论(0) 分类 英语新闻

LJUBLJANA, Aug. 10 (Xinhua) -- Slovenia is working out a cyber security strategy to upgrade its capability against cyber-attacks, the Slovenian Press Agency reported on Saturday. A national cyber security authority will be set up within the framework

发表于:2019-02-08 / 阅读(83) / 评论(0) 分类 英语新闻

President Obama who is on holiday in Hawaii signed an executive order Friday to impose new sanctions against North Korea. The new sanctions are part of U.S. reaction to Pyongyang's suspected role in cyber-attacks on Sony Pictures Entertainment and th

发表于:2019-02-08 / 阅读(60) / 评论(0) 分类 英语新闻

Hackers with apparent ties to Russia have conducted a series of cyber attacks on US media outlets including The New York Times, CNN reported Tuesday. 美国有线电视新闻网(CNN)上周四报道称,与俄罗斯有明显联系的黑客们对包

发表于:2019-02-18 / 阅读(81) / 评论(0) 分类 英语新闻

The New York Times has reported that the Obama administration is expected to approve the policy in the coming weeks. The newspaper said the new policy will also govern how US intelligence agencies can carry out searches of overseas computer networks

发表于:2019-02-21 / 阅读(74) / 评论(0) 分类 英闻天下

The Chinese foreign ministry has issued a new statement, calling the hacking allegations groundless criticism, dubbing it irresponsible and unprofessional. The latest comments come following a report by a U.S. computer security company, which is accu

发表于:2019-02-21 / 阅读(139) / 评论(0) 分类 英闻天下
学英语单词
2-methyl-5-isopropyl phenol
a Roman holiday
adjourning
advocational
Akhalgori
anemogenic
at my fingertips
be desperate for
biderivations
bipropellant propulsion system
bit cell
black marketeering
blob-like
book-collector
buried halos
cabarrus
cannagine
Chincoteague pony
clean-shaved
colonsay
communication command and terminal system
continental climates
Cuban tobacco
difference diode
dillis
Direct Orange S
dongo
draza mihailovic
extended data management system
fax switch
filter layer
forhide
frame cross tie
funbox
gravelwalk
gravicembaloes
grid wave
heifer in milk
hew off
high resistive fault
huarache
hull-house
insurance policy loan
interrogue
Isaurian
key-guard
lee partitioning method
lifefest
Mauchenheim
mcever
methyl cycloheptanol
Mini-ITX
monolithic technique
muvo
naunts
ncrna
normal-gamma posterior density
paleomagnetic time scale
partials
passive filters and other passive networks
plated wire memory
Polmiror
post-precipitate
power network
pre-pedestal level
prefetched instruction
Prishtina
pseudomorph by alteration
radio quiet quasar
reaction-control correction
residual voltage current characteristic
rules of choice of law
safeguards control
short-term indicator of economic condition
shoulder seasons
signal power
sorbopyranose
sour grapess
specialized high-speed line
splutting
standard freight scale
statistical interpretation
stromatology
sub-underwritings
T-120
thermal ataxia
three per cent
tokia
tombac
transformation of contradiction
trifluorochlorethylene resin
true level
uncle fuckers
universal hypertrichosis
unvitrifiable
upper memory area
ventriculoatrial
villagers
Wasserburg (Bodensee)
water stream injection pump
Willow River
wimber