Examples of using Malicious attacks in English and their translations into Spanish
{-}
-
Official
-
Colloquial
your computer becomes extremely vulnerable to other malicious attacks especially when you browse the Internet.
making your system vulnerable against malicious attacks.
tighten the security and protect the website from malicious attacks.
During use, the AMD Secure Processor works in tandem with Microsoft's Device Guard to thwart malicious attacks.
It has become necessary as earlier cryptocurrencies have undergone malicious attacks which led to the huge loss of economy.
Cloudbric's WAF operates as a proxy to detect and filter malicious attacks, requiring its customers to change their website's Domain Name System DNS.
The classification may be more detailed- e.g. malicious attacks, system errors/malfunctions, natural disasters& force majeure, unintentional human error Comment DK2.
your data against hackers and malicious attacks.
What is scarier is malicious attacks are no longer limited to hackers;
worms and other malicious attacks.
Belarus has also found itself the target not only of malicious attacks but also of economic sanctions for the choice that the Belarussian nation made with the election of its own President.
disabled, or even taken over to attempt more malicious attacks.
hardware to prevent malicious attacks from hacking and spamming.
also exposed the computer to malicious attacks that exploited insecure features of the rootkit software.
Symantec's analysts focused on data security incidents noted that malicious attacks, system glitches and device theft resulted in a majority of the breaches they analyzed.
to keep them up to date Installing security updates to prevent malicious attacks, repairing them in the event of a malfunction,
step up their individual measures to ensure security against theft of nuclear material for illicit purposes and malicious attacks against nuclear facilities.
physical access control for critical computers to prevent console-based malicious attacks, power interruptions
the United Nations could respond in a more caring and consistent way in the wake of malicious attacks against the Organization.
Computers can be catalysts for malicious attack or intellectual property theft.