The hacker designed a computer virus.
这个黑客设计了一种电脑病毒。
This hacker had managed to get into the system.
这一个黑客设法侵入了系统。
The tackers broke into the Pentagon's security system last night.
昨晚有黑客闯入五角大楼的安保系统。
The hacker managed to breach the company's firewall and access sensitive data.
这名黑客成功突破了公司的防火墙,获取了敏感数据。
After hours of coding, the programmer identified and fixed a potential security flaw that could have been exploited by
hackers.
经过几个小时的编码,程序员识别并修复了一个可能被黑客利用的安全漏洞。
The hacker used social engineering tactics to trick employees into revealing their login credentials.
该黑客使用社会工程学手段诱骗员工泄露他们的登录凭证。
Ethical
hackers, also known as white hat
hackers, help organizations improve their cybersecurity by finding vulnerabilities legally.
道德黑客,也称为白帽黑客,通过合法地发现漏洞帮助组织提升网络安全。
The cybercrime unit is working tirelessly to track down the hacker responsible for the major data breach.
网络犯罪部门正在不遗余力地追踪造成重大数据泄露的责任黑客。
In the movie, the protagonist is a skilled hacker who uses his abilities for good, stopping cyber attacks on critical infrastructure.
电影中的主角是一名技术高超的黑客,他用自己的能力做好事,阻止了对关键基础设施的网络攻击。
Companies often hire penetration testers, or ethical
hackers, to simulate attacks and test the strength of their digital defenses.
公司常聘请渗透测试员或道德黑客来模拟攻击,测试其数字防御的强度。
The hacker forum was taken down by law enforcement agencies after a lengthy investigation.
经过长时间的调查,执法机构关闭了这个黑客论坛。
A group of anonymous
hackers claimed responsibility for the website defacement, demanding better privacy laws.
一群匿名黑客声称对网站篡改负责,并要求出台更好的隐私保护法律。
With the rise of cryptocurrency, there has been an increase in hacking attempts targeting digital wallets.
随着加密货币的兴起,针对数字钱包的黑客攻击企图有所增加。
Be it smart light bulbs or self-driving vehicles, these devices have vulnerabilities that hackers could exploit," said Ian Lim, field chief security officer of Japan and Asia-Pacific at Palo Alto Networks, a global cybersecurity leader.
全球网络安全领导者Palo Alto Networks的日本和亚太地区现场首席安全官Ian Lim表示:“无论是智能灯泡还是自动驾驶汽车,这些设备都存在黑客可能利用的漏洞。
Another 44 percent of respondents said that IoT devices are micro-segmented within security zones — an industry best practice where organizations create tightly controlled security zones on their networks to isolate IoT devices to prevent hackers from moving laterally on a network.
另有44%的受访者表示,物联网设备在安全区内进行了细分——这是一种行业最佳实践,组织在其网络上创建严格控制的安全区,以隔离物联网设备,防止黑客在网络上横向移动。
The hostile attacks included network traffic attacks, hacker attacks and unfair scalping.
Hackers are very attracted to the high profile and value of online streaming services, said Patrick Sullivan, director of Akamai's Security Technology and Strategy.
Four Democratic senators have reportedly expressed concern that video surveillance cameras and the automated aspects of railway cars may be the tools of spies or hackers.
Facebook said 15 million people had their accounts compromised after hackers stole their sensitive information including their names, phone numbers, emails and other contact details, while 14 million users were illegally accessed for their user names, gender, religion, geographic location, birthday, work and education status.
The world's largest social media announced on Sept 28 that attackers exploited a vulnerability in Facebook's code that would allow hackers to steal access tokens used by Facebook users as login digital keys and then take control of their accounts.
"The security issue could let hackers steal Facebook access tokens used by Facebook users as login digital keys and then take control of their accounts, Facebook said in a blog post.
"Entering a new era of big data, cybersecurity will become as important as money, and online data will become a key target of criminals and hackers," Qi said.
NAIROBI — Governments and corporations should invest in cloud computing that promises better data storage and retrieval options while protecting it from intrusion by hackers, a Huawei executive said on Thursday in a commentary published by Kenya's daily newspaper People.
"Entering a new era of big data, cybersecurity will become as important as money and online data will become a key target of online criminals and hackers.
Hackers often use China's cloud platforms to launch attacks, said the report, adding that 78.8 percent of all the recorded DDoS attacks on targets in China were initiated from cloud platforms.
Since these vehicles are highly intelligent and networked, there is the possibility that hackers could break into the system and pose a great danger to road safety, Zeng said.
Charlie Miller and Chris Valasek, the world-renowned white-hat hackers and security experts, shared their views on securing self-driving cars at the conference.
"Hackers can attack the intelligent connected vehicles and control the braking systems through cellular network, Bluetooth and CD player," Miller said.
He said that since these vehicles are highly intelligent and networked, there is a possibility that hackers could break into the system and pose a great danger to road safety.
One of the biggest problems for driverless cars is that hackers may enter the vehicles' operating system, according to Deng Feng, co-founder of Northern Light Venture Capital.
He says that, since these vehicles are highly intelligent and networked, hackers might invade the system, thereby posing dangers to road safety.
他说,由于这些车辆高度智能化并联网,黑客可能会侵入系统,从而对道路安全构成威胁。
Another big problem is that hackers may enter the vehicles' operating system.
Ant Group is training its proprietary AI technologies to simulate hacker invasions in a bid to enhance risk-detection capabilities and thus boost its defensive resilience.
Once attacked and controlled by hackers, the consequences can be catastrophic," Zhou said.
Many current AI systems are actually fragile and it's easy for hackers to forge," Tian said.
"Software vulnerabilities are inevitable…Once attacked and controlled (by hackers), the consequences can be catastrophic.
Exploiting these vulnerabilities, hackers could remotely control millions of cars produced by the car company after 2017, Zhou noted.
"Once attacked and controlled by hackers, the consequences may be catastrophic," Zhou, whose security company is known for its anti-virus software, said.
Each such block is connected to those before and behind it, making it difficult to tamper with because a hacker would need to change the block containing that record and all those linked to it to avoid detection.
Diana Kelley, the cybersecurity field chief technology officer at Microsoft Corp, said hackers will increasingly use AI to make malware more destructive.
As the internet of things and cloud greatly expand the number of devices and the amount of data they gather, the area of attack by hackers widens just as sharply as well.
But the increased volumes and the vast variety of data makes it more tempting for hackers and criminals.
"From my knowledge with my Chinese colleagues, the investment in the Chinese banking industry is rising on the security topic because of the risk consciousness and the hackers … Today, the question is no longer 'if you will be attacked' but 'when you will be attacked'.
"Loopring is the protocol for building decentralized exchanges, it enables people to have control over their own crypto-assets during the whole trading process instead of giving their money to centralized platforms which can be the targets of hackers," he said.
In addition to implementing the Cybersecurity Law which came into effect in June 2017, Chinese police have intensified the fight against hackers and hacking activities.
The Ministry of Public Security announced last month that law enforcement officers nationwide solved 2,430 criminal cases involving hackers since the beginning of 2022, leading to the detention of more than 7,000 suspects.
China has been a prominent victim of cyberattacks, with hackers and criminal groups frequently targeting its critical information infrastructure and key industries.