The hacker designed a computer virus.
这个黑客设计了一种电脑病毒。
This hacker had managed to get into the system.
这一个黑客设法侵入了系统。
The tackers broke into the Pentagon's security system last night.
昨晚有黑客闯入五角大楼的安保系统。
The hacker managed to breach the company's firewall and access sensitive data.
这名黑客成功突破了公司的防火墙,获取了敏感数据。
After hours of coding, the programmer identified and fixed a potential security flaw that could have been exploited by
hackers.
经过几个小时的编码,程序员识别并修复了一个可能被黑客利用的安全漏洞。
The hacker used social engineering tactics to trick employees into revealing their login credentials.
该黑客使用社会工程学手段诱骗员工泄露他们的登录凭证。
Ethical
hackers, also known as white hat
hackers, help organizations improve their cybersecurity by finding vulnerabilities legally.
道德黑客,也称为白帽黑客,通过合法地发现漏洞帮助组织提升网络安全。
The cybercrime unit is working tirelessly to track down the hacker responsible for the major data breach.
网络犯罪部门正在不遗余力地追踪造成重大数据泄露的责任黑客。
In the movie, the protagonist is a skilled hacker who uses his abilities for good, stopping cyber attacks on critical infrastructure.
电影中的主角是一名技术高超的黑客,他用自己的能力做好事,阻止了对关键基础设施的网络攻击。
Companies often hire penetration testers, or ethical
hackers, to simulate attacks and test the strength of their digital defenses.
公司常聘请渗透测试员或道德黑客来模拟攻击,测试其数字防御的强度。
The hacker forum was taken down by law enforcement agencies after a lengthy investigation.
经过长时间的调查,执法机构关闭了这个黑客论坛。
A group of anonymous
hackers claimed responsibility for the website defacement, demanding better privacy laws.
一群匿名黑客声称对网站篡改负责,并要求出台更好的隐私保护法律。
With the rise of cryptocurrency, there has been an increase in hacking attempts targeting digital wallets.
随着加密货币的兴起,针对数字钱包的黑客攻击企图有所增加。
Be it smart light bulbs or self-driving vehicles, these devices have vulnerabilities that hackers could exploit," said Ian Lim, field chief security officer of Japan and Asia-Pacific at Palo Alto Networks, a global cybersecurity leader.
全球网络安全领导者Palo Alto Networks的日本和亚太地区现场首席安全官Ian Lim表示:“无论是智能灯泡还是自动驾驶汽车,这些设备都存在黑客可能利用的漏洞。
Another 44 percent of respondents said that IoT devices are micro-segmented within security zones — an industry best practice where organizations create tightly controlled security zones on their networks to isolate IoT devices to prevent hackers from moving laterally on a network.
另有44%的受访者表示,物联网设备在安全区内进行了细分——这是一种行业最佳实践,组织在其网络上创建严格控制的安全区,以隔离物联网设备,防止黑客在网络上横向移动。
The hostile attacks included network traffic attacks, hacker attacks and unfair scalping.
Hackers are very attracted to the high profile and value of online streaming services, said Patrick Sullivan, director of Akamai's Security Technology and Strategy.
Four Democratic senators have reportedly expressed concern that video surveillance cameras and the automated aspects of railway cars may be the tools of spies or hackers.
Facebook said 15 million people had their accounts compromised after hackers stole their sensitive information including their names, phone numbers, emails and other contact details, while 14 million users were illegally accessed for their user names, gender, religion, geographic location, birthday, work and education status.
The world's largest social media announced on Sept 28 that attackers exploited a vulnerability in Facebook's code that would allow hackers to steal access tokens used by Facebook users as login digital keys and then take control of their accounts.
"The security issue could let hackers steal Facebook access tokens used by Facebook users as login digital keys and then take control of their accounts, Facebook said in a blog post.
"Entering a new era of big data, cybersecurity will become as important as money, and online data will become a key target of criminals and hackers," Qi said.
NAIROBI — Governments and corporations should invest in cloud computing that promises better data storage and retrieval options while protecting it from intrusion by hackers, a Huawei executive said on Thursday in a commentary published by Kenya's daily newspaper People.