Of the deliberate cyber incidents reported, unauthorised access was the most common(102), followed by malware(53), phishing attacks(51) and ransomware(33).
During the survey, 6035 malicious domains and 120 toolkit variants targeted the high-tech sector, making the high-tech industry a prime target for phishing attacks.
每月网络钓鱼攻击.
Monthly online fishing contest.
如上所述,网络钓鱼攻击是对VoIP安全的严重威胁。
As mentioned above, phishing attacks represent a serious threat to VoIP security.
据称,网络钓鱼攻击是2019年网络安全面临的最大挑战。
Phishing attacks are said to be the most significant challenge for cybersecurity in 2019.
在此期间,仅巴西就遭遇了15.51%的网络钓鱼攻击。
Brazil alone saw 15.51 percent of all phishing attacks during that period.
这些僵尸程序完全有可能收集足够的信息来对LinkedIn用户发起网络钓鱼攻击。
It's entirely possible that these bots are gathering sufficient information to launch phishing attacks against LinkedIn users.
因此我们可以看到网络钓鱼攻击基本上由两部分组成:消息和源页面。
So we can see that a phishing attack basically consists of two parts: the message and the source page.
MyDoom:这个15年前的恶意软件在2019年仍被用于网络钓鱼攻击.
MyDoom: The 15-year-old malware that's still being used in phishing attacks in 2019.
他们根据鱼叉式网络钓鱼攻击进行了数据泄露,允许访问超过7800万条医疗记录。
They had a data breach based on a spear phishing attack that allowed access to over 78 million healthcare records.
加入一系列网络安全网络研讨会中的第一个:保护您的企业免受网络钓鱼攻击.
Join the first in a series of cybersecurity webinars: Safeguard your business from phishing attacks.
最终用户通过培训,学会识别并避免网络钓鱼攻击、社会工程骗局、恶意链接和下载。
End users are trained to recognize and avoid phishing attacks, social engineering traps, malicious links, and downloads.
我们向您展示的两个示例证明,网络钓鱼攻击可以简单,复杂,介于两者之间。
The two examples we showed you prove that phishing attacks can be simple, sophisticated, and everything in between.
来自各方面的安全专业人员正在寻找解决方案,以解决日益增长的网络钓鱼攻击风险。
Security professionals from across the board are looking for solutions to solve the growing risk of phishing attacks.
今年3月,社交网站仍然是网络钓鱼攻击的主要对象,尽管他们的份额下降了4.3%,为34.5%。
In March, Social networking sites continued to be the most attractive target for phishing attacks though their share fell 4.3 percentage points and averaged 34.5%.
ZeroFont网络钓鱼攻击可以绕过Office365保护.
ZeroFont phishing attack can bypass Office 365 protections.
即使用户很谨慎,有时也很难发现网络钓鱼攻击。
Even for cautious users, it's sometimes difficult to detect a phishing attack.
社会工程方法-包括网络钓鱼攻击-能帮助吸引潜在受害者的注意。
Social engineering methods- including phishing attacks- help to attract the potential victim's attention.
通常,网络钓鱼攻击似乎来自可靠的来源,例如您的银行服务提供商或您经常使用的网站。
Often, phishing attacks appear to come from trusted sources such as your banking provider or a website you regularly use.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt