[网络] 攻击

Experts Say More Research Needed to Foil Cyber It doesnt matter who you are or where you live - if you have access to a computer, you are a potential target for cyber criminals. And its not just individuals at risk. Earlier this month, U.S. Attorney

发表于:2018-12-08 / 阅读(51) / 评论(0) 分类 VOA标准英语2013年(五月)

Businesses Struggle to Keep Up in Fight Against Cyberattacks NEW YORK Cybersecurity criminals are more sophisticated, bold and resilient than ever, according to a new study by U.S. computer networking company Cisco, which revealed major flaws in busi

发表于:2018-12-16 / 阅读(44) / 评论(0) 分类 VOA标准英语2016年(一月)

MARGARET WARNER:We turn to a new cyber campaign against American banking giants and growing worries about what they might foreshadow. It began late last month and continues to this day. Two more U.S. banks are the latest targets in the spate of cyber

发表于:2018-12-31 / 阅读(59) / 评论(0) 分类 PBS访谈商业系列

More Than 5 Million Cyber Attacks in Kenya 肯尼亚去年发生五百多万次网络攻击 There were 5.4 million cyber-attacks recorded last year in Kenya. That is more than double the number recorded in 2013. 去年,肯尼亚记录到540万起网络

发表于:2019-01-08 / 阅读(75) / 评论(0) 分类 2015年VOA慢速英语(七)月

BEIJING, March 19 (Xinhua) -- A computer security official said China has become the world's biggest victim of cyber attacks, with a report from a national computer monitoring center revealing that many domestic computers were controlled via overseas

发表于:2019-01-11 / 阅读(66) / 评论(0) 分类 英语新闻

US Takes Action Against Cyber Theft Threat From VOA Learning English, this is the Technology Report in Special English. The United States has announced a plan to fight the quickly growing threat from cyber spies and Internet attackers known as hacker

发表于:2019-01-12 / 阅读(44) / 评论(0) 分类 2013年VOA慢速英语(五)月

AS IT IS 2016-02-01 Businesses Weak on Cyber-Crime Protection 企业在网络犯罪防御上表现软弱 A new report says businesses around the world are not keeping up with the new and increasingly tricky methods of cyber criminals. The internation

发表于:2019-01-12 / 阅读(52) / 评论(0) 分类 2016年VOA慢速英语(二)月

The U.S. Defense Department is in the final stages of creating a new military command to defend against attacks on the nation's military computer systems. We report from the Pentagon on plans for U.S. Cyber Command. Deputy Secretary of Defense Willi

发表于:2019-01-13 / 阅读(67) / 评论(0) 分类 VOA标准英语2009年(六月)

Computer hackers used to be mostly sophisticated criminals, high tech spies or new media pranksters. But now a new breed of hacker is engaged in what some call a cyber war of political activism. In the streets of New York, these supporters of the Wik

发表于:2019-01-13 / 阅读(50) / 评论(0) 分类 VOA标准英语2010年(十二)月

A new OECD Cyber Security study by British professors says cyber weaponry will be used routinely in future wars. The study says computer attacks on their own will not necessarily constitute a threat, but a coordinated attack - or in combination with

发表于:2019-01-14 / 阅读(75) / 评论(0) 分类 VOA标准英语2011年(一月)

Cyber Threat Top Concern for NATO Cyber attacks on corporations and governments are no longer unusual. Suspects and their computers are hauled away on a regular basis. That's why Admiral James Stavridis sees cyber security as the top challenge for hi

发表于:2019-01-14 / 阅读(62) / 评论(0) 分类 VOA标准英语2013年(五月)

Cyber War for US, Syria? 美国,叙利亚存在网络战争? WASHINGTON The Syrian government and its allies are widely believed to be using cyber attacks to target members of the opposition. Meanwhile, the Obama administration reportedly has been

发表于:2019-01-14 / 阅读(58) / 评论(0) 分类 VOA标准英语2014年(三月)

CYBERSPACE enables fast communications, electricity grids, international banking and military might. While we cant live without the Web, its very openness has made individuals, organizations and even nations targets in this new era of cyber warfare. 网

发表于:2019-01-19 / 阅读(55) / 评论(0) 分类 中英双语新闻

Internet security 网络安全 An anonymous foe 幽灵般的敌人 Hackers hit big companies, the IMF and the headlines 网络黑客席卷名企和国际货币基金组织,大出风头 Jun 16th 2011 | SAN FRANCISCO | from the print edition DEFENCE

发表于:2019-01-26 / 阅读(100) / 评论(0) 分类 经济学人综合

BEIJING, March 11 (Xinhua) -- A Foreign Ministry spokeswoman on Monday said China would like to work with other countries to curb cyber attacks. The Chinese government resolutely opposes and has cracked down on hacking in accordance with the law and

发表于:2019-02-08 / 阅读(62) / 评论(0) 分类 英语新闻

LJUBLJANA, Aug. 10 (Xinhua) -- Slovenia is working out a cyber security strategy to upgrade its capability against cyber-attacks, the Slovenian Press Agency reported on Saturday. A national cyber security authority will be set up within the framework

发表于:2019-02-08 / 阅读(58) / 评论(0) 分类 英语新闻

President Obama who is on holiday in Hawaii signed an executive order Friday to impose new sanctions against North Korea. The new sanctions are part of U.S. reaction to Pyongyang's suspected role in cyber-attacks on Sony Pictures Entertainment and th

发表于:2019-02-08 / 阅读(41) / 评论(0) 分类 英语新闻

Hackers with apparent ties to Russia have conducted a series of cyber attacks on US media outlets including The New York Times, CNN reported Tuesday. 美国有线电视新闻网(CNN)上周四报道称,与俄罗斯有明显联系的黑客们对包

发表于:2019-02-18 / 阅读(60) / 评论(0) 分类 英语新闻

The New York Times has reported that the Obama administration is expected to approve the policy in the coming weeks. The newspaper said the new policy will also govern how US intelligence agencies can carry out searches of overseas computer networks

发表于:2019-02-21 / 阅读(50) / 评论(0) 分类 英闻天下

The Chinese foreign ministry has issued a new statement, calling the hacking allegations groundless criticism, dubbing it irresponsible and unprofessional. The latest comments come following a report by a U.S. computer security company, which is accu

发表于:2019-02-21 / 阅读(111) / 评论(0) 分类 英闻天下
学英语单词
a tug of love
absolute atmosphere
accounting recapitalization
Acer trifidum H. et A.
air search radar
anhydrous hydrogen fuloride
Anti-Ten
Banyan switch
Basaidu
beach-bums
betrunk stream
beurres
binary alloy photoconductor
bins it
blank-flange
bobs us
Bocki
call history
certificate of survey
chronic pollution
Cicer arietinum L.
cob collecting comb
coil opening machine
common ground
constraints tree
deens
do battle with
dunking
earth segment
Education IRA
El Qahira
environ.
Fergusonian
field loss relay
geo-relational model
Graphidineae
heath cock grouse
hermann wilhelm gorings
hermaphrodites
inactivation of thrombin
injealous
jenacain
kreosote
learning outcomes
Leyden's disease
loyal
lunar orbit spacecraft
lycorinine
maggotry
mayed
Mdlles
mellow-soil plow
motacillidaes
mycomelic acid
nonangled
object expression
of service to
okhotsk blocking high
orta
parabolic cylinder
paratope
pepitoes
piston displacement
plane articulation
pot ring
previous environment
pulse ratio
quadruple whole
rachiomete
ratsimilaho
releasing structure
routhless
schmidt's field balance
search for a moving target
sensitizing treatment
shearing work
shipping day
Sialis
silhouette
slum-dweller
solidarity trade union
spbi
spinpolarization
staggered
Sterlegova, Mys
streptobacillus
summary liquidation case
tecostanine
text upper bound
the green room
Thioban
Uddeholm
unrestricted-use
uzes
ventilatable
Vera Lynn
verification of seals and stamps
wait for a while
wanni
wastewater oxidation
writed
zero-length rocket