在 英语 中使用 The attacker can 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
The attacker could use this information in subsequent attacks against the system.
The attackers can get access to the personal information of millions of people.
The attackers can get access to the personal information of millions of people.
By making this determination, the attacker could decide whether or not to continue the attack.
The attacker could execute code that hides the attack and the victim may never know his machine was compromised.
The attacker could be a disgruntled employee or an outsider using services located behind-the-firewall and perimeter security defenses.
This means the attackers can remotely run any malware on the targeted system or server via their evil DNS service.
If a user with administrative privileges subsequently logs on to the system, the attacker could run arbitrary code in kernel mode.
Cybereason believe the attackers could have been on compromised networks for as long as seven years.
This way the attackers can build a map of interactions with various people- and identify the victim's social and professional circles.".
The attackers could abuse hijacked websites for various purposes, including spamming, phishing, and other direct or indirect money-making schemes.
In particular, the attackers can use this new attack technique to read information which was supposed to be safe and encrypted.
Cybereason believes the attackers could have been on compromised networks for as long as seven years.
The attacker could sell this information to advertising companies or could leverage it to deliver specific content to the targeted users.
The attacker could then manipulate the victim into unknowingly performing actions on the target website.
To exploit the vulnerability, the attacker could send specially crafted SMB messages to the Windows Search service.
As they are tough to detect, the attackers can easily use botnets and rootkits to modify and access your personal information.
By doing this, the attackers can then change their device to look like a keyboard or mouse and remote control your laptop.
The attackers can be divided into two groups by their attack characteristic(see Figure 3).
With a few infected computers, the attackers can easily increase the range of their crimes and impact both small and large-sized organizations.