phishing

英 [ˈfɪʃɪŋ] 美 [ˈfɪʃɪŋ]

n.  网络诱骗(通过互联网或电邮骗取他人身份证件、银行账号等以盗取金钱)

COCA.45412



牛津词典

noun

  1. 网络诱骗(通过互联网或电邮骗取他人身份证件、银行账号等以盗取金钱)
    the activity of tricking people by getting them to give their identity, bank account numbers, etc. over the Internet or by email, and then using these to steal money from them

    柯林斯词典

    1. 网络仿冒,网络钓鱼(用仿冒银行电子邮件等骗取个人信息以盗取金钱或用于犯罪等)
      Phishing is the practice of trying to trick people into giving secret financial information by sending e-mails that look as if they come from a bank. The details are then used to steal people's money, or to steal their identity in order to commit crimes.

      双语例句

      1. While many hackers use relatively basic tools, such as phishing or malware, they often wield them with different motives.
        尽管许多黑客用的只是相对基础的工具,比如网络钓鱼或恶意软件,但他们运用这些工具的目的各有不同。
      2. This time, Google laid the blame for the latest security intrusions on so-called phishing attacks or other similar techniques that had been used to trick e-mail users into giving away their passwords, rather than any breach in its own systems.
        这一次,谷歌称最新的黑客行为是所谓钓鱼攻击,或是基于类似的技术。这类技术可以诱骗电子邮件用户泄露密码,而无需入侵系统本身。
      3. The company acknowledged that its clients had been targeted by hackers using phishing emails that encourage a user to click on what appears to be a legitimate message in an attempt to steal information.
        该公司承认,它的客户成为了黑客钓鱼邮件(通过诱使用户点击貌似正当的邮件来窃取信息)的目标。
      4. A phoney fraud alert is similar to a phishing scam.
        骗子诈骗警告类似于网络钓鱼诈骗。
      5. Spear Phishing is an easy and effective way to attack a network.
        网络钓鱼是一种发动网络攻击的简单而有效的方式。
      6. When it comes to high-tech fraud, one of the most common scams is "phishing".
        所以,当谈到高科技诈骗时,最常见的诈骗方法之一是“网络钓鱼”。
      7. The flaw seems to affect all advisory pages and can be used by ill-intentioned individuals to distribute malware, launch phishing campaigns, or instrument various malicious attacks.
        这个安全漏洞似乎影响到所有咨询网页,可以使用个人发布的恶意软件,进行钓鱼或各种不同的恶意攻击。
      8. As well as phishing attacks, some gangs implant spying software-known as'malware '-on their targets'computers to track every website they visit and every password they use.
        除了网络钓鱼攻击之外,一些团伙还在他们攻击对象的电脑上装入名为“恶意软件”的暗植间谍软件,以此来跟踪他们浏览过的网页并记录下他们所使用的每一个密码。
      9. Computer security specialist says spear phishing often provides the means for even broader attacks.
        电脑安全专家称为鱼叉式网络钓鱼常常为更深的攻击提供指导。
      10. Protection of endpoints on a corporate network from all kinds of malware ( including viruses, Trojans and spyware), potentially dangerous programs, network attacks and phishing.
        保护企业网络端点免受各种恶意软件(包括病毒、木马及间谍软件)、潜在危险程序、网络攻击和网络钓鱼。
      11. New error pages provide a simplified user experience which helps to mitigate social-engineering and phishing attacks.
        新的错误页面提供了一个简单的用户体验帮助用户减少社会工程学和仿冒网站攻击。
      12. Spear phishing on the other hand is not normally targeting the random individual.
        鱼叉式网络钓鱼的不同之处则在于它并不以随机目标为对象。
      13. You can check whether a web address is included in the phishing database, using the Web Anti-Virus, IM Anti-Virus or Anti-Spam component.
        您可以检查是否有网络地址中包含钓鱼数据库,利用网络防病毒,即时消息防病毒软件或防垃圾邮件的组成部分。
      14. The application's components also enable users to protect their computers against currently unknown threats and phishing, and to restrict users'access to the Internet.
        应用程序的组成部分还使用户能够保护自己的计算机免受目前未知的威胁和网络钓鱼,并限制用户的上网。
      15. Phishing site domain names can be changed constantly.
        钓鱼网站的网域名称可以不断地更换。
      16. It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.
        它还保护了公共密钥不能被篡改,从而防止网络欺诈,欺骗,和篡改代码的攻击。
      17. Google has fixed a security flaw on its Web site that opened the door to phishing scams, account hijacks and other attacks, security researchers said Monday.
        周一安全研究专家说,Google已经修复了自身Web站点存在的安全漏洞,包括网络钓鱼攻击,账户欺诈和其他类型的可能的漏洞。
      18. With malicious intent, this could have been a phishing site, fooling the user into revealing personal details.
        如果带有恶意目的,所连向的可能是欺骗用户吐露个人信息的网络钓鱼(phishing)网站。
      19. Consider monitoring or filtering outbound DNS connections to better protect your network against certain phishing attacks and a new breed of trojans that masquerades as DHCP servers.
        考虑监测或过滤出站DNS连接,以便更好地维护您的枉络,对抗某些钓鱼攻击和一种新的伪装成DHCP服务器的特洛伊木马。
      20. Phishing is the malicious practice of luring you into disclosing your personal information, such as your bank account number and password.
        网络仿冒是一种引诱您泄露个人信息(如银行帐号和密码)的恶意行为。
      21. This module scans links on the web page, comparing the website addresses against its database of suspicious and phishing websites.
        此模块扫描上的链接的网页,网址比较其数据库对可疑和钓鱼网站。
      22. This could mean logging down all DNS queries& which is also useful to track down suspicious traffic trends from phishing attacks.
        这可能意味着记录所有DNS查询-这对从钓鱼式攻击追捕可疑流量趋势也是有益的。
      23. "Such scams may contain links or attachments which direct users to phishing or malware-laden sites," it said.
        “这样的骗术中常包含带有附件的链接,会将用户转接到钓鱼或恶意软件网站。”其宣称。
      24. Phishing is the term coined by hackers who imitate legitimate companies in emails to entice people to share passwords or credit-card numbers.
        网页仿冒是黑客们造出来的词,他们在电子邮件中模仿合法的公司,诱骗人们把自己的口令或信用卡号码告诉他们。
      25. Forever, many hackers attack means, such as phishing and SQL injection attacks, start from the identity authentication.
        目前的很多黑客攻击手段,如钓鱼攻击、SQL注入攻击等各种网络攻击方式都是由身份认证开始的。
      26. E-mail is at risk-vulnerable to external attack from viruses, spam, spyware and phishing technologies.
        电子邮件存在风险&易受病毒,垃圾软件,间谍软件以及钓鱼技术的攻击。
      27. Despite high-profile examples of internet security breaches, such as the recent incident of phishing email scams.
        尽管互联网安全隐患重重,比如最近发生的多起网络钓鱼邮件和垃圾邮件。
      28. And the phishing was their idea?
        钓鱼电邮是他们的主意?
      29. This was a great improvement in security intended to reduce phishing attacks and other password weaknesses, but on its own, it benefits only Google Apps users.
        这是对安全的一大改善,目的是减少钓鱼攻击和其他密码软肋,但从其本身来说,它只是让Google应用的用户受惠。
      30. Spear phishing is targeting a particular organization.
        鱼叉式网络钓鱼以特定的对象为标靶。