Meanwhile, cyber criminals caused unprecedented levels of disruption by focusing their exploits on relatively simple IT tools, unsecured IoT devices and cloud services.”.
从报告中可以看到,网络犯罪分子仍然在用同样的方法和技术取得成功,受害者们也仍然在犯同样的错误。
Cyber-criminals will continue to find success with the same tried and tested techniques, and their victims will continue to make the same mistakes.
因此,网络犯罪分子越来越关注破坏或控制关键设备和基础设施的设备和OT系统。
As a result, cybercriminals are increasingly focusing their efforts on sabotaging or commandeering devices and OT systems that control critical equipment and infrastructure.
例如,网络犯罪分子可能会为在合法网站上放置广告付费。
For example, a cyber criminal can pay to place an advertisement on a legitimate website.
网络犯罪分子将个性化电子邮件发送给具有共同特征的特定个人或群体,例如在同一部门工作的员工。
Cyber-criminals send personalized emails to particular individuals or groups of people with something in common, such as employees working in the same department.
政府机构和网络犯罪分子在互联网上从来没有像现在这样活跃,所以你需要注意并知道你在做什么。
Government institutions and cyber criminals have never been as active on the internet, so you need to watch out and know what you're doing.
An estimated 23 billion IoT devices are being installed worldwide, which cybercriminals can use to introduce malware or initiate denial of service attacks.
Emerging technologies have enabled cyber-criminals to use increasingly sophisticated methods but these innovations could also help boost defence against hackers.
网络犯罪分子密切关注这些应用程序,因为其中所含的漏洞可以用来攻击数量最多的用户。
These applications are closely monitored by cybercriminals because vulnerabilities in them can be used to attack the maximum number of users.
Cyber criminals have targeted larger businesses for years, which has led many small business owners to believe they're somehow immune.
此外,网络犯罪分子可以进入整个物联网系统的“大脑”,并对其进行控制。
What is more, cyber-criminals can get the access to the“brain” of the whole IoT system and take control of it.
因此,网络犯罪分子可以把你的耳机变成窃听设备,悄悄地录下声音,并通过互联网发送到服务器。
As a result, cybercriminals can turn your earphones into a wiretapping device to secretly record sound and send it to their servers via the Internet.
通过使用这些接口,网络犯罪分子可以收集有关安装在受害者设备上的软件的所有信息。
By using these interfaces, cyber-criminals can gather all the information about the software installed on a victim's device.
专家们说,黑客和网络犯罪分子将使用高级模式识别能力通过密码攻击继续其恶意活动。
It is said by experts that the hackers and cybercriminals will continue their malicious activities via cryptographic attacks using advanced pattern recognition aptitudes.
网络犯罪分子也有更多可用的资源,并正在以机器人程序的形式来扫描漏洞和攻击那些暴露最严重的网站。
Cyber criminals also have more resources available to them in the form of bots that scan for vulnerabilities and attack the sites most exposed.
网络犯罪分子开始攻击新建立的在线服务器,大约一小时后,他们被打开,研究建议。
According to new research, cyber-criminals start attacking newly set up online servers about an hour after they are turned on.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt