首页 / 词典 / good

phishing

美 [ˈfɪʃɪŋ]英 [ˈfɪʃɪŋ]
  • n.网络钓鱼;网络诱骗(通过互联网或电邮骗取他人身份证件、银行账号等以盗取金钱)
phishingphishing

noun

U网络诱骗(通过互联网或电邮骗取他人身份证件、银行账号等以盗取金钱)
the activity of tricking people by getting them to give their identity, bank account numbers, etc. over the Internet or by email, and then using these to steal money from them

phishing

频次

  • 1
    网络仿冒,网络钓鱼(用仿冒银行电子邮件等骗取个人信息以盗取金钱或用于犯罪等)
    Phishing is the practice of trying to trick people into giving secret financial information by sending e-mails that look as if they come from a bank. The details are then used to steal people's money, or to steal their identity in order to commit crimes.

  1. Deep Analysis into the Access Point Links of Phishing Sites

    网络欺诈网站访问点链接特征深度分析

  2. Established the phishing protective system based on the DNS .

    建立了基于DNS的网络钓鱼防护系统。

  3. Networking Network Data Analysis of Phishing Crime

    网络钓鱼犯罪分析

  4. Phishing detection method based on visual similarities

    以视觉相似为基础的Phishing检测方法

  5. Spear Phishing is an easy and effective way to attack a network .

    网络钓鱼是一种发动网络攻击的简单而有效的方式。

  6. Authentication scheme based on trusted computing of preventing phishing attacks

    基于可信计算的防网络欺诈认证方案

  7. Therefore , DNS is the front line of phishing defense .

    因此,DNS是防御网络钓鱼的第一线。

  8. We pay attention to " phishing " closely in 2006

    2006密切关注网络钓鱼

  9. Thus it is necessary to do research on phishing detection and develop software tools with high accuracy and efficiency .

    因此开发高效准确的钓鱼网页检测技术是势在必行的。

  10. Phishing site domain names can be changed constantly .

    钓鱼网站的网域名称可以不断地更换。

  11. Computer security specialist says spear phishing often provides the means for even broader attacks .

    电脑安全专家称为鱼叉式网络钓鱼常常为更深的攻击提供指导。

  12. Model the Phishing attack pattern .

    Phishing(仿冒)攻击模式的模型化。

  13. Online detection and prevention of phishing attacks

    网络钓鱼攻击的在线检测及防治

  14. At the same time by researching the latest phishing sites , improve detection rate of the anti-phishing system .

    同时能够及时发现最新的钓鱼网站,提高了反钓鱼系统的检出率。

  15. Spear phishing on the other hand is not normally targeting the random individual .

    鱼叉式网络钓鱼的不同之处则在于它并不以随机目标为对象。

  16. With the development of network , the Internet frauds like the phishing attract more and more attention in the community .

    随着网络的普及,钓鱼攻击等互联网诈骗活动已经引起社会各界的广泛关注。

  17. New error pages provide a simplified user experience which helps to mitigate social-engineering and phishing attacks .

    新的错误页面提供了一个简单的用户体验帮助用户减少社会工程学和仿冒网站攻击。

  18. In recent years the phishing web is increasingly fierce and become the biggest problems which the Internet users have to face to .

    近年来钓鱼网页愈演愈烈,已经成为网民在互联网中所面临的最大问题。

  19. As many as95 billion phishing emails were in circulation in2010 .

    2010年一年中就有9.5亿伪冒电邮在网络世界中传播。

  20. Spear phishing is targeting a particular organization .

    鱼叉式网络钓鱼以特定的对象为标靶。

  21. In the to line , type the e-mail address of the company to whom you are reporting the phishing message .

    在“收件人”行中,键入您要向其举报网络仿冒邮件的公司的电子邮件地址。

  22. From the view of network attack , this paper abstracts three models of phishing and introduces detailedly its implement mechanism and key techniques .

    论文从网络攻击的角度,提炼出了三种钓鱼攻击的模型,并对其实现机理、关键技术进行了比较详细的剖析。

  23. When it comes to high-tech fraud , one of the most common scams is " phishing " .

    所以,当谈到高科技诈骗时,最常见的诈骗方法之一是“网络钓鱼”。

  24. Network Phishing attacks use both social engineering and technical subterfuge to steal consumers ' personal identity data and financial account credentials .

    网络钓鱼攻击是指利用社会工程学和技术手段窃取消费者的个人资料以及金融账户身份认证证书。

  25. And the phishing was their idea ?

    钓鱼电邮是他们的主意?

  26. A phoney fraud alert is similar to a phishing scam .

    骗子诈骗警告类似于网络钓鱼诈骗。

  27. In most cases , phishing achieved through DNS and the losses were also caused during the use of network applied services based on DNS .

    网络钓鱼大都是通过DNS达到目的的,被钓者也是在使用基于DNS的网络应用服务中造成损失的。

  28. This method not only overcomes the problem of phishing sites ' short survival time , but also reduces the time of processing image similarity matching .

    该方法既克服了钓鱼网页存活时间短的问题,又能快速地与特征库进行匹配。

  29. In this paper , the main work is : 1 . According to the development trends of phishing emails , several new features are proposed for detection .

    本文的主要工作和意义在于:1.针对钓鱼邮件的发展趋势,提出几种新的特征用于检测。

  30. They also gave her a quick lesson in phishing attacks and a lecture on the importance of installing software updates .

    他们还向她简要介绍了钓鱼攻击和安装软件更新的重要性。