搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
Global computer security firm Symantec Hosted Services said the number of e-mail attacks ahead of this week's meeting of the leaders of the Group of 20 major economic powers in Seoul, South Korea, has increased.
Symantec Hosted Services warns that criminals are looking to exploit the G-20 summit and said that during the past month, the number of e-mail attacks using the global gathering1 to try to get at unsuspecting targets has tripled.
Martin Lee, a senior software engineer at the computer security firm, said attackers are preying2 on those in the government and business sectors3, who are trying to keep up with what is happening at the summit.
"The idea being is to try and catch the target unawares or just to peek4 their interest, so that they'll think, 'Oh, hang on, what is this? Why I am getting this special e-mail? Perhaps there is something in here which is really interesting, which I could use to my advantage for my career or for my business,'" said Lee.
Lee says that in the run up to this seek's G-20 summit, attackers have used e-mails with malicious5 attachments7 such as one from a phony journalist with subject lines that read: "North Korea may attempt to disrupt G-20 Summit: Seoul Warns."Lee said one e-mail attack focuses on the latest information about the summit; another promises an e-mail attachment6 containing a contact list for summit participants. "And it's that, that the attackers are trying to do. Just raise the interest level of their intended victims, so that they will bite the hook, click on the link, install that malware even though it looks like a totally innocuous document. And at that moment - bang - the attacker has got control of their computer." Lee says that although the number of attacks is relatively8 small - about six a day, compared to mass attacks that occur in the hundreds of thousands each day - these targeted attacks are made by what he calls "master craftsmen9" who target high-value victims.
"So they can get high-value information on the computers that they infect and get it back home. What they do afterwards with the information, we don't really know. But with the amount of time and the amount of effort and skill in this, it has got to be worth a lot of money to somebody."Lee adds that attackers have gone to great lengths to make their e-mails look real. He said attackers have hacked10 into legitimate11 e-mail servers and the web sites of organizations to make their messages look legitimate. Symantec Hosted Services said that during the past five years, total high-value targeted attacks have increased significantly from one or two attacks per week to nearly 80 per day.
In the run up to the G-20 meeting, the South Korean government raised its alert level for cyber attacks as a precautionary security measure. It also has expressed interest in getting cyber security on the agenda of the meeting.
1 gathering | |
n.集会,聚会,聚集 | |
参考例句: |
|
|
2 preying | |
v.掠食( prey的现在分词 );掠食;折磨;(人)靠欺诈为生 | |
参考例句: |
|
|
3 sectors | |
n.部门( sector的名词复数 );领域;防御地区;扇形 | |
参考例句: |
|
|
4 peek | |
vi.偷看,窥视;n.偷偷的一看,一瞥 | |
参考例句: |
|
|
5 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
6 attachment | |
n.附属物,附件;依恋;依附 | |
参考例句: |
|
|
7 attachments | |
n.(用电子邮件发送的)附件( attachment的名词复数 );附着;连接;附属物 | |
参考例句: |
|
|
8 relatively | |
adv.比较...地,相对地 | |
参考例句: |
|
|
9 craftsmen | |
n. 技工 | |
参考例句: |
|
|
10 hacked | |
生气 | |
参考例句: |
|
|
11 legitimate | |
adj.合法的,合理的,合乎逻辑的;v.使合法 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。