In addition, a POW consensus algorithm running on all of these computers ensures the validity of each transaction and prevents fraud and malicious attacks.
在商业领域中开发软件应用程序时,善用密码学是对抗篡改数据、恶意攻击的关键。
When developing software applications in the commercial sector, the need to utilize cryptology is key to defend against malicious attacks that tamper with data.
网络安全是用来保护电脑、服务器、移动设备、电子系统,网路和数据免受恶意攻击的方式。
Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks and data from malicious attacks.
Using these stolen credentials, malicious actors can take over accounts and steal personal data, creating a snowball effect that can be devastating for your business.
跨站点请求伪造(CSRF)是一种恶意攻击,用户被欺骗以执行他或她不打算做的操作。
Cross-Site Request Forgery(CSRF) is a malicious attack where a user is tricked into performing an action he or she didn't intend to do.
这是为了防止恶意攻击者控制合法的扩展及其用户。
This is intended to help prevent malicious actors from taking control of legitimate add-ons and their users.
故报告称,“证明能有效制止恶意攻击、数据丢失、数据完整性攻击、拒绝服务攻击等”。
According to the paper, hasproved a deterrent against malware attacks, data loss attacks, data integrity attacks, and denial of service attacks.".
在OSX上发现的绝大多数恶意攻击并不复杂或不容易传播。
Indeed, the vast majority of new malware attacks targeting OS X aren't entirely complex or prone to spreading.
即使把对其他类型恶意攻击的恐惧放在一边,数据泄露仍然是当今所有企业的一大担忧。
Even putting the fear of other types of malicious attacks aside, data breaches are a huge concern for organizations today.
此攻击是区块链的恶意攻击,指当黑客获得超过50%的网络挖掘哈希值。
This attack refers to a malicious attack on blockchain when hackers obtained more than 50% of mining hashrate of network.
定期安全更新帮助保护计算机不受恶意攻击,因此升级和保持最新很重要。
Regular security updates help protect computers from malicious attacks, so upgrading and staying current is important.
这些漏洞可能会暴露用户数据或允许恶意攻击者访问测试和开发中使用的计算机和服务器。
These vulnerabilities can leave user data exposed or allow malicious actors to gain access to computers and servers used in testing and development.
Applications must be designed and deployed in a way that protects them from malicious attacks, restricts access to only approved users, and protects sensitive data.
在许多情况下,警报疲劳会使得恶意攻击信号会逃离雷达范围,尽管它已经被标记为可疑信号。
In many cases, this allows a malicious indicator to go below the radar despite being flagged as suspicious.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt