搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
Internet security researchers say they have identified software weaknesses that put millions of smart devices at risk for attacks, or hacking3.
The security weaknesses, also known as vulnerabilities, could be used by hackers4 to attack business or home computer networks.
The report, by cybersecurity company Forescout Technologies, says the affected5 devices were built by an estimated 150 manufacturers.
Many devices are designed for personal use and include the ability to control home cameras and temperature controls from a distance, the report said. Companies use similar devices in security systems, heating and cooling equipment, printers and servers.
There is no evidence that any attacks have already been carried out on the vulnerable devices. But the risks pointed6 out in the report led the U.S. Cybersecurity and Infrastructure7 Security Agency (CISA) to issue an advisory8 warning.
In the advisory, CISA suggests that defensive9 measures should be taken to lessen10 the risks of hacking. Specifically, the agency said industrial control systems should not be accessible from the internet and should be separated from company networks.
Awais Rashid is a computer scientist at Britain's Bristol University who examined the report's findings. He told The Associated Press that in the worst case, control systems that drive "critical services" - such as water, power and self-operating building equipment - could be damaged.
Rashid said the discovery shows the dangers cybersecurity experts often find in internet-linked devices designed without much attention to security. Careless programming by developers appears to be the main issue in this case, he added.
Dealing11 with the problem is especially complex because the vulnerabilities are found in so-called open-source software. Open-source means the software is free to use and that the program that was first created can be changed by anyone.
In this case, the issue relates to internet software that runs communications through a technology called TCP/IP. This technology uses a set of rules that control the connection of computer systems to the internet.
Elisa Costante is vice1 president of research for Forescout. She told the AP the fact that open-source software is not owned by anyone makes the problem difficult to solve. In addition, some of the vulnerable TCP/IP methods used are twenty years old.
This means it is up to device manufacturers to fix the vulnerabilities themselves and some may not have the time or money to do so, Costante said.
"The biggest challenge comes in finding out what you've got," said Bristol University's Rashid.
The vulnerabilities could leave business networks open to destructive denial-of-service attacks. Computer systems could also be infected with ransomware or other tools that permit attackers to take over devices.
Experts say the risks are even higher now with so many people working from home during the coronavirus pandemic. This could permit attackers to hack2 into home networks and use this as a pathway into company networks.
Forescout says it contacted as many device manufacturers as it could about the vulnerabilities. It also warned security officials in the U.S., Germany and Japan.
Words in This Story
accessible – adj. able to be reached or easily gotten
challenge – n. something that is difficult to do
ransomware – n. software designed by internet attackers that can lock computer users out of their own devices unless they pay money
1 vice | |
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的 | |
参考例句: |
|
|
2 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
3 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
4 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
5 affected | |
adj.不自然的,假装的 | |
参考例句: |
|
|
6 pointed | |
adj.尖的,直截了当的 | |
参考例句: |
|
|
7 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
8 advisory | |
adj.劝告的,忠告的,顾问的,提供咨询 | |
参考例句: |
|
|
9 defensive | |
adj.防御的;防卫的;防守的 | |
参考例句: |
|
|
10 lessen | |
vt.减少,减轻;缩小 | |
参考例句: |
|
|
11 dealing | |
n.经商方法,待人态度 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。