| 1. | Spear phishing is targeting a particular organization 鱼叉式网络钓鱼以特定的对象为标靶。 |
| 2. | A phishing e - mail has been detected 已检测到网络钓鱼邮件。 |
| 3. | The phishers take the user ' s login information and empty the account 网络钓鱼者盗走了用户的登录信息并且把银行账户劫空。 |
| 4. | Spear phishing on the other hand is not normally targeting the random individual 鱼叉式网络钓鱼的不同之处则在于它并不以随机目标为对象。 |
| 5. | Recently a specialized form for phishing has begun to appear - the term used for this is " spear phishing " 一种网络钓鱼的特殊形式最近已经开始出现? ?我们用“鱼叉式网络钓鱼”这个术语来描述之。 |
| 6. | The innocence of humans [ gullibility ? ] that allows criminals to trick them into installing malware on their machines , responding to phishing attacks , etc 人的纯真[易受骗? ]易受罪犯哄骗而在机器上安装恶意软件,响应网络钓鱼攻击,等等。 |
| 7. | Phishing occurs when fraudulent e - mails that appear to be from a legitimate source are sent in an effort to obtain sensitive information from a user 在欺诈的电子邮件显得来源合法,并且似乎是力求获得某个用户感测信息时,网络钓鱼发生了。 |
| 8. | Most persons have been warned numerous times about phishing attempts trying to trick them into revealing user names / passwords to banks etc 对于尝试通过欺骗行为以使用户暴露其银行帐户等用户名/密码的网络钓鱼来说,多数人已经受到过警示。 |
| 9. | Spoofing is the phone industry ' s version of phishing , in which criminals use fake e - mails to fool computer users into divulging personal information 窜改来电显示是网络钓鱼的电信业版本,而网络钓鱼是指歹徒伪造电子邮件,让电脑用户泄漏个人资料。 |
| 10. | The phishing filter uses heuristics to determine whether a site displays common characteristics of phishing sites and if so , flags it as suspicious 网络钓鱼过滤器使用启发式方法判断网站是否显示网络钓鱼网站常用字符,如果发现,将网站标记为可疑。 |