Oersette "phishing attack" nei Sineesk

Toant {einresultaat} fan 50 oersettingen fan de sin "phishing attack" fan Ingelsk nei Sineesk

Oersetting fan Ingelsk nei Sineesk fan {sykje}

Ingelsk
Sineesk

EN Tags:blockchain, ice phishing, ice phishing attack, ice phishing attack on blockchain, microsoft ice phishing, phishing attack, web3, what is ice phishing, what is ice phishing attack

ZH 标签:网络复原力,网络复原力和DMARC,网络复原力框架,网络安全复原力

Transliteraasje biāo qiān: wǎng luò fù yuán lì, wǎng luò fù yuán lì héDMARC, wǎng luò fù yuán lì kuāng jià, wǎng luò ān quán fù yuán lì

EN Tags:difference between phishing and spoofing, phishing attack, phishing vs spoofing, Spoofing, spoofing vs phishing, what is phishing

ZH 标签:网络钓鱼和欺骗的区别,网络钓鱼攻击,网络钓鱼与欺骗,欺骗, 欺骗与网络钓鱼,什么是网络钓鱼

Transliteraasje biāo qiān: wǎng luò diào yú hé qī piàn de qū bié, wǎng luò diào yú gōng jī, wǎng luò diào yú yǔ qī piàn, qī piàn, qī piàn yǔ wǎng luò diào yú, shén me shì wǎng luò diào yú

EN Tags:effective phishing, Phishing, phishing attacks, phishing methods, why is phishing so effective

ZH 标签:有效的网络钓鱼,网络钓鱼, 网络钓鱼攻击, 网络钓鱼方法,为什么网络钓鱼如此有效

Transliteraasje biāo qiān: yǒu xiào de wǎng luò diào yú, wǎng luò diào yú, wǎng luò diào yú gōng jī, wǎng luò diào yú fāng fǎ, wèi shén me wǎng luò diào yú rú cǐ yǒu xiào

EN Tags:how to prevent phishing, how to prevent Spam, phishing vs spam, spam, spam vs phishing. Phishing, what is spam

ZH 标签:如何防止网络钓鱼,如何防止垃圾邮件,网络钓鱼与垃圾邮件,垃圾邮件,垃圾邮件与网络钓鱼。网络钓鱼,什么是垃圾邮件

Transliteraasje biāo qiān: rú hé fáng zhǐ wǎng luò diào yú, rú hé fáng zhǐ lā jī yóu jiàn, wǎng luò diào yú yǔ lā jī yóu jiàn, lā jī yóu jiàn, lā jī yóu jiàn yǔ wǎng luò diào yú。wǎng luò diào yú, shén me shì lā jī yóu jiàn

EN Employee Education: Educate employees on the dangers of phishing, the various types of phishing and how to prevent an attack. You can also run random phishing tests to keep your team vigilant.

ZH 员工教育:教育员工了解网络钓鱼的危害、网络钓鱼的各种类型以及如何防范攻击。您还可以采取随机 网络钓鱼测试,以保持团队的警惕。

Transliteraasje yuán gōng jiào yù: jiào yù yuán gōng le jiě wǎng luò diào yú de wēi hài、 wǎng luò diào yú de gè zhǒng lèi xíng yǐ jí rú hé fáng fàn gōng jī。nín hái kě yǐ cǎi qǔ suí jī wǎng luò diào yú cè shì, yǐ bǎo chí tuán duì de jǐng tì。

EN Employee Education: Educate employees on the dangers of phishing, the various types of phishing and how to prevent an attack. You can also run random phishing tests to keep your team vigilant.

ZH 员工教育:教育员工了解网络钓鱼的危害、网络钓鱼的各种类型以及如何防范攻击。您还可以采取随机 网络钓鱼测试,以保持团队的警惕。

Transliteraasje yuán gōng jiào yù: jiào yù yuán gōng le jiě wǎng luò diào yú de wēi hài、 wǎng luò diào yú de gè zhǒng lèi xíng yǐ jí rú hé fáng fàn gōng jī。nín hái kě yǐ cǎi qǔ suí jī wǎng luò diào yú cè shì, yǐ bǎo chí tuán duì de jǐng tì。

EN Educate employees on the dangers of phishing, the various types of phishing and how to prevent an attack. You can also run random phishing tests to keep your team vigilant.

ZH 教育员工了解网络钓鱼的危害、网络钓鱼的各种类型以及如何防范攻击。您也可以随机运行网络钓鱼测试,让您的团队保持警惕。

Transliteraasje jiào yù yuán gōng le jiě wǎng luò diào yú de wēi hài、 wǎng luò diào yú de gè zhǒng lèi xíng yǐ jí rú hé fáng fàn gōng jī。nín yě kě yǐ suí jī yùn xíng wǎng luò diào yú cè shì, ràng nín de tuán duì bǎo chí jǐng tì。

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteraasje diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteraasje diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN Over the years, phishing has become far more sophisticated. It’s estimated that around 32% of all breaches involve phishing and around 64% of organizations report phishing attempts at least once in their history.

ZH 多年来,网络钓鱼已经变得更加复杂。据估计,所有泄露事件中约有 32% 涉及网络钓鱼,约有 64% 的组织曾经至少报告过一次遭遇到网络钓鱼企图。

Transliteraasje duō nián lái, wǎng luò diào yú yǐ jīng biàn dé gèng jiā fù zá。jù gū jì, suǒ yǒu xiè lù shì jiàn zhōng yuē yǒu 32% shè jí wǎng luò diào yú, yuē yǒu 64% de zǔ zhī céng jīng zhì shǎo bào gào guò yī cì zāo yù dào wǎng luò diào yú qǐ tú。

EN Phishing attacks rose significantly in 2020. The pandemic created the perfect environment of fear, misinformation and unsecured computers and networks, resulting in a cyber crime spike. Around 75% of organizations reported a phishing attack in 2020.

ZH 2020 年,网络钓鱼攻击显著增加。疫情创造了一个充满恐惧、错误信息以及不安全电脑和网络的完美环境,导致网络犯罪激增。大约 75% 的组织在 2020 年报告发生了网络钓鱼攻击。

Transliteraasje 2020 nián, wǎng luò diào yú gōng jī xiǎn zhe zēng jiā。yì qíng chuàng zào le yī gè chōng mǎn kǒng jù、 cuò wù xìn xī yǐ jí bù ān quán diàn nǎo hé wǎng luò de wán měi huán jìng, dǎo zhì wǎng luò fàn zuì jī zēng。dà yuē 75% de zǔ zhī zài 2020 nián bào gào fā shēng le wǎng luò diào yú gōng jī。

EN Phishing attacks rose significantly in 2020. The pandemic created the perfect environment of fear, misinformation and unsecured computers and networks, resulting in a cyber crime spike. Around 75% of organizations reported a phishing attack in 2020.

ZH 2020 年,网络钓鱼攻击显著增加。疫情创造了一个充满恐惧、错误信息以及不安全电脑和网络的完美环境,导致网络犯罪激增。大约 75% 的组织在 2020 年报告发生了网络钓鱼攻击。

Transliteraasje 2020 nián, wǎng luò diào yú gōng jī xiǎn zhe zēng jiā。yì qíng chuàng zào le yī gè chōng mǎn kǒng jù、 cuò wù xìn xī yǐ jí bù ān quán diàn nǎo hé wǎng luò de wán měi huán jìng, dǎo zhì wǎng luò fàn zuì jī zēng。dà yuē 75% de zǔ zhī zài 2020 nián bào gào fā shēng le wǎng luò diào yú gōng jī。

EN Since many ransomware payloads are delivered in phishing emails, training employees to avoid phishing scams is another critical step to preventing infection.

ZH 许多勒索软件有效负载是通过网络钓鱼电子邮件传递,因此培训员工避免网络钓鱼欺诈是防止攻击的另一个关键步骤。

Transliteraasje xǔ duō lēi suǒ ruǎn jiàn yǒu xiào fù zài shì tōng guò wǎng luò diào yú diàn zi yóu jiàn chuán dì, yīn cǐ péi xùn yuán gōng bì miǎn wǎng luò diào yú qī zhà shì fáng zhǐ gōng jī de lìng yī gè guān jiàn bù zhòu。

EN Ultimate Guide to Phishing: Defining Phishing and Preventing Scams

ZH 网络钓鱼终极指南:网络钓鱼定义和防范诈骗

Transliteraasje wǎng luò diào yú zhōng jí zhǐ nán: wǎng luò diào yú dìng yì hé fáng fàn zhà piàn

EN Even the largest companies aren’t entirely safe from phishing; companies like Facebook and Google have suffered massive phishing attacks in recent history, accounting for around $100 million in damages.

ZH 即使是最大的公司也不能完全避免网络钓鱼;Facebook 和 Google 等公司在过去遭受了大规模的网络钓鱼攻击,造成了约 1 亿美元的损失。

Transliteraasje jí shǐ shì zuì dà de gōng sī yě bù néng wán quán bì miǎn wǎng luò diào yú;Facebook hé Google děng gōng sī zài guò qù zāo shòu le dà guī mó de wǎng luò diào yú gōng jī, zào chéng le yuē 1 yì měi yuán de sǔn shī。

Ingelsk Sineesk
facebook facebook
google google

EN Smishing is the same as email phishing, except that it’s perpetrated via SMS messages. A victim receives a similar message to a phishing email in a text message, with a link to follow or attachment to download.

ZH 短信钓鱼与电子邮件网络钓鱼基本相同,只是它是通过短信进行。受害者在短信中收到与网络钓鱼电子邮件类似的消息,其中包含要点击的链接或要下载的附件。

Transliteraasje duǎn xìn diào yú yǔ diàn zi yóu jiàn wǎng luò diào yú jī běn xiāng tóng, zhǐ shì tā shì tōng guò duǎn xìn jìn xíng。shòu hài zhě zài duǎn xìn zhōng shōu dào yǔ wǎng luò diào yú diàn zi yóu jiàn lèi shì de xiāo xī, qí zhōng bāo hán yào diǎn jī de liàn jiē huò yào xià zài de fù jiàn。

EN Tags:Domain spoofing, phishing and spoofing, phishing attacks, Spoofing

ZH 标签:域名欺骗, 钓鱼和欺骗, 钓鱼攻击,欺骗

Transliteraasje biāo qiān: yù míng qī piàn, diào yú hé qī piàn, diào yú gōng jī, qī piàn

EN With the significant growth in internet usage, phishing has become a regular form of cybercrime. In this article, we present the different types of phishing and the measures you can take to protect your company?s brand image.

ZH 奥林匹克运动会,成了网路犯罪者眼中欺骗受害者的大好良机,也为如何在网路上保护品牌增添一项威胁。

Transliteraasje ào lín pǐ kè yùn dòng huì, chéng le wǎng lù fàn zuì zhě yǎn zhōng qī piàn shòu hài zhě de dà hǎo liáng jī, yě wèi rú hé zài wǎng lù shàng bǎo hù pǐn pái zēng tiān yī xiàng wēi xié。

EN Phishing, Spear Phishing, and Whaling

ZH 网络钓鱼、鱼叉式网络钓鱼和捕鲸

Transliteraasje wǎng luò diào yú、 yú chā shì wǎng luò diào yú hé bǔ jīng

EN Phishing isn?t new. In fact, it?s been around for about as long as the internet has. So why do phishing attacks still work?

ZH 网络钓鱼并不是什麽新鲜事, 事实上,从开始有网路的时候,它就已经存在了。 那为什麽到现在仍有网路钓鱼攻击呢?

Transliteraasje wǎng luò diào yú bìng bù shì shén mó xīn xiān shì, shì shí shàng, cóng kāi shǐ yǒu wǎng lù de shí hòu, tā jiù yǐ jīng cún zài le。 nà wèi shén mó dào xiàn zài réng yǒu wǎng lù diào yú gōng jī ne?

EN Microsoft warns users against "Ice phishing attacks" on the blockchain. Read more to find out what is Ice Phishing and how to prevent it.

ZH 网络复原力建立在良好的网络安全实践的基础上,解决企业承受、恢复和对抗网络威胁的能力。让DMARC成为贵公司网络复原力框架的一部分。

Transliteraasje wǎng luò fù yuán lì jiàn lì zài liáng hǎo de wǎng luò ān quán shí jiàn de jī chǔ shàng, jiě jué qǐ yè chéng shòu、 huī fù hé duì kàng wǎng luò wēi xié de néng lì。ràngDMARC chéng wèi guì gōng sī wǎng luò fù yuán lì kuāng jià de yī bù fēn。

EN It is safe to say that anti-spam solutions offer definitive protection against inbound phishing attempts (incoming phishing emails sent to an organization’s employees) but are rendered ineffective against social engineering attacks like spoofing.

ZH 可以说,反垃圾邮件解决方案提供了明确的保护,以防止入站的网络钓鱼企图(发送到组织的员工手中的网络钓鱼邮件),但对于像欺骗这样的社会工程攻击,却变得无效了。

Transliteraasje kě yǐ shuō, fǎn lā jī yóu jiàn jiě jué fāng àn tí gōng le míng què de bǎo hù, yǐ fáng zhǐ rù zhàn de wǎng luò diào yú qǐ tú (fā sòng dào zǔ zhī de yuán gōng shǒu zhōng de wǎng luò diào yú yóu jiàn), dàn duì yú xiàng qī piàn zhè yàng de shè huì gōng chéng gōng jī, què biàn dé wú xiào le。

EN Since many ransomware payloads are delivered in phishing emails, training employees to avoid phishing scams is another critical step to preventing infection.

ZH 许多勒索软件有效负载是通过网络钓鱼电子邮件传递,因此培训员工避免网络钓鱼欺诈是防止攻击的另一个关键步骤。

Transliteraasje xǔ duō lēi suǒ ruǎn jiàn yǒu xiào fù zài shì tōng guò wǎng luò diào yú diàn zi yóu jiàn chuán dì, yīn cǐ péi xùn yuán gōng bì miǎn wǎng luò diào yú qī zhà shì fáng zhǐ gōng jī de lìng yī gè guān jiàn bù zhòu。

EN Ultimate Guide to Phishing: Defining Phishing and Preventing Scams

ZH 网络钓鱼终极指南:网络钓鱼定义和防范诈骗

Transliteraasje wǎng luò diào yú zhōng jí zhǐ nán: wǎng luò diào yú dìng yì hé fáng fàn zhà piàn

EN Even the largest companies aren’t entirely safe from phishing; companies like Facebook and Google have suffered massive phishing attacks in recent history, accounting for around $100 million in damages.

ZH 即使是最大的公司也不能完全避免网络钓鱼;Facebook 和 Google 等公司在过去遭受了大规模的网络钓鱼攻击,造成了约 1 亿美元的损失。

Transliteraasje jí shǐ shì zuì dà de gōng sī yě bù néng wán quán bì miǎn wǎng luò diào yú;Facebook hé Google děng gōng sī zài guò qù zāo shòu le dà guī mó de wǎng luò diào yú gōng jī, zào chéng le yuē 1 yì měi yuán de sǔn shī。

Ingelsk Sineesk
facebook facebook
google google

EN Smishing is the same as email phishing, except that it’s perpetrated via SMS messages. A victim receives a similar message to a phishing email in a text message, with a link to follow or attachment to download.

ZH 短信钓鱼与电子邮件网络钓鱼基本相同,只是它是通过短信进行。受害者在短信中收到与网络钓鱼电子邮件类似的消息,其中包含要点击的链接或要下载的附件。

Transliteraasje duǎn xìn diào yú yǔ diàn zi yóu jiàn wǎng luò diào yú jī běn xiāng tóng, zhǐ shì tā shì tōng guò duǎn xìn jìn xíng。shòu hài zhě zài duǎn xìn zhōng shōu dào yǔ wǎng luò diào yú diàn zi yóu jiàn lèi shì de xiāo xī, qí zhōng bāo hán yào diǎn jī de liàn jiē huò yào xià zài de fù jiàn。

EN Phishing vs Spoofing has always been a concerning topic. Phishing and Spoofing are two different types of cybercrime that can look very similar to the untrained eye.

ZH 网络钓鱼与欺骗一直是一个令人担忧的话题。网络钓鱼和欺骗是两种不同类型的网络犯罪,在未经训练的人看来可能非常相似。

Transliteraasje wǎng luò diào yú yǔ qī piàn yī zhí shì yī gè lìng rén dān yōu de huà tí。wǎng luò diào yú hé qī piàn shì liǎng zhǒng bù tóng lèi xíng de wǎng luò fàn zuì, zài wèi jīng xùn liàn de rén kàn lái kě néng fēi cháng xiāng shì。

EN What to do if you clicked on a phishing link? If you clicked on a phishing link you need to act quickly before a lot of damage is done

ZH 如果你点击了一个网络钓鱼链接,该怎么办?如果你点击了一个网络钓鱼链接,你需要在造成大量损失之前迅速采取行动

Transliteraasje rú guǒ nǐ diǎn jī le yī gè wǎng luò diào yú liàn jiē, gāi zěn me bàn? rú guǒ nǐ diǎn jī le yī gè wǎng luò diào yú liàn jiē, nǐ xū yào zài zào chéng dà liàng sǔn shī zhī qián xùn sù cǎi qǔ xíng dòng

EN Since many ransomware payloads are delivered via phishing emails, training employees to avoid phishing scams is a critical step to prevent infection.

ZH 许多勒索软件有效负载是通过网络钓鱼电子邮件传递,因此培训员工避免网络钓鱼诈骗是防范感染的一个关键步骤。

Transliteraasje xǔ duō lēi suǒ ruǎn jiàn yǒu xiào fù zài shì tōng guò wǎng luò diào yú diàn zi yóu jiàn chuán dì, yīn cǐ péi xùn yuán gōng bì miǎn wǎng luò diào yú zhà piàn shì fáng fàn gǎn rǎn de yī gè guān jiàn bù zhòu。

EN You can deploy phishing training into your business using a program such as KnowBe4, which sends simulated phishing tests to employees.

ZH 您可以使用诸如 KnowBe4 之类的程序在您的企业中部署网络钓鱼培训,这类程序可向员工发送模拟网络钓鱼测试。

Transliteraasje nín kě yǐ shǐ yòng zhū rú KnowBe4 zhī lèi de chéng xù zài nín de qǐ yè zhōng bù shǔ wǎng luò diào yú péi xùn, zhè lèi chéng xù kě xiàng yuán gōng fā sòng mó nǐ wǎng luò diào yú cè shì。

EN "Phishing is the fastest growing attack vector against DroneDeploy, and we're targeted daily. Remote Browser provides an invisible protective layer to prevent entire classes of exploits and data exfiltration, with zero impact to business productivity."

ZH 「網路釣魚是針對 DroneDeploy 增長速度最快的攻擊手段,我們每天都深受其害。遠端瀏覽器隔離提供了一個隱形的保護層,可預防整個類別的入侵和資料洩露,而且對業務生產力毫無影響。」

Transliteraasje 「wǎng lù diào yú shì zhēn duì DroneDeploy zēng zhǎng sù dù zuì kuài de gōng jī shǒu duàn, wǒ men měi tiān dōu shēn shòu qí hài。yuǎn duān liú lǎn qì gé lí tí gōng le yī gè yǐn xíng de bǎo hù céng, kě yù fáng zhěng gè lèi bié de rù qīn hé zī liào xiè lù, ér qiě duì yè wù shēng chǎn lì háo wú yǐng xiǎng。」

EN Limit the risk of being targeted by a phishing attack.

ZH 降低網路釣魚攻擊的風險

Transliteraasje jiàng dī wǎng lù diào yú gōng jī de fēng xiǎn

EN And how do entities like WHO find out when someone is using their domain to launch a phishing attack?

ZH 而像世卫组织这样的实体如何发现有人利用其域名发起网络钓鱼攻击?

Transliteraasje ér xiàng shì wèi zǔ zhī zhè yàng de shí tǐ rú hé fā xiàn yǒu rén lì yòng qí yù míng fā qǐ wǎng luò diào yú gōng jī?

EN Keeper alerts users on non-compliant websites to mitigate the risk of a phishing attack.

ZH Keeper 可提醒用户注意不合规网站,以降低网络钓鱼攻击的风险。

Transliteraasje Keeper kě tí xǐng yòng hù zhù yì bù hé guī wǎng zhàn, yǐ jiàng dī wǎng luò diào yú gōng jī de fēng xiǎn。

EN Phishing is a sophisticated social engineering attack meant to entice the victim into voluntarily revealing sensitive information and depends on a specific narrative or image to present itself as legitimate.

ZH 网络钓鱼是一种复杂的社会工程攻击,旨在引诱受害者自愿透露敏感信息,并依靠特定的叙述或图片来显示其合法性。

Transliteraasje wǎng luò diào yú shì yī zhǒng fù zá de shè huì gōng chéng gōng jī, zhǐ zài yǐn yòu shòu hài zhě zì yuàn tòu lù mǐn gǎn xìn xī, bìng yī kào tè dìng de xù shù huò tú piàn lái xiǎn shì qí hé fǎ xìng。

EN A phishing attack is also dangerous to everyday people, causing damages or resulting in stolen identities.

ZH 网络钓鱼攻击对普通人也很危险,可造成损失或导致身份被盗。

Transliteraasje wǎng luò diào yú gōng jī duì pǔ tōng rén yě hěn wēi xiǎn, kě zào chéng sǔn shī huò dǎo zhì shēn fèn bèi dào。

EN Click here to view the full news article on the phishing attack.

ZH 点击这里查看关于网络钓鱼攻击的完整新闻报道。

Transliteraasje diǎn jī zhè lǐ chá kàn guān yú wǎng luò diào yú gōng jī de wán zhěng xīn wén bào dào。

EN Phishing is a sophisticated social engineering attack meant to entice the victim into voluntarily revealing sensitive information and depends on a specific narrative or image to present itself as legitimate.

ZH 网络钓鱼是一种复杂的社会工程攻击,旨在引诱受害者自愿透露敏感信息,并依靠特定的叙述或图片来显示其合法性。

Transliteraasje wǎng luò diào yú shì yī zhǒng fù zá de shè huì gōng chéng gōng jī, zhǐ zài yǐn yòu shòu hài zhě zì yuàn tòu lù mǐn gǎn xìn xī, bìng yī kào tè dìng de xù shù huò tú piàn lái xiǎn shì qí hé fǎ xìng。

EN A phishing attack is also dangerous to everyday people, causing damages or resulting in stolen identities.

ZH 网络钓鱼攻击对普通人也很危险,可造成损失或导致身份被盗。

Transliteraasje wǎng luò diào yú gōng jī duì pǔ tōng rén yě hěn wēi xiǎn, kě zào chéng sǔn shī huò dǎo zhì shēn fèn bèi dào。

EN Compromised credentials, phishing, and cloud misconfiguration were the top attack vectors

ZH 泄露的凭证、网络钓鱼和云配置错误是主要的攻击媒介

Transliteraasje xiè lù de píng zhèng、 wǎng luò diào yú hé yún pèi zhì cuò wù shì zhǔ yào de gōng jī méi jiè

EN Whether you’re an email web, or cloud hosting provider, you’ll know that domain hosting is more fraught with security risks than ever before. If your customers are hit with a phishing attack, they might lose their trust in your services.

ZH 无论你是电子邮件网络,还是云托管供应商,你都会知道,域名托管比以往任何时候都充满了安全风险。如果你的客户受到网络钓鱼攻击,他们可能会失去对你服务的信任。

Transliteraasje wú lùn nǐ shì diàn zi yóu jiàn wǎng luò, hái shì yún tuō guǎn gōng yīng shāng, nǐ dōu huì zhī dào, yù míng tuō guǎn bǐ yǐ wǎng rèn hé shí hòu dōu chōng mǎn le ān quán fēng xiǎn。rú guǒ nǐ de kè hù shòu dào wǎng luò diào yú gōng jī, tā men kě néng huì shī qù duì nǐ fú wù de xìn rèn。

EN Imagine if someone were to use your company’s name in their email to launch a phishing attack that stole user data or money. Attackers basically have the power to use your brand against you and exploit people’s trust in your company. 

ZH 想象一下,如果有人在他们的电子邮件中使用你公司的名字来发动网络钓鱼攻击,窃取用户数据或金钱。攻击者基本上有能力利用你的品牌来对付你,利用人们对你公司的信任。 

Transliteraasje xiǎng xiàng yī xià, rú guǒ yǒu rén zài tā men de diàn zi yóu jiàn zhōng shǐ yòng nǐ gōng sī de míng zì lái fā dòng wǎng luò diào yú gōng jī, qiè qǔ yòng hù shù jù huò jīn qián。gōng jī zhě jī běn shàng yǒu néng lì lì yòng nǐ de pǐn pái lái duì fù nǐ, lì yòng rén men duì nǐ gōng sī de xìn rèn。 

EN A phishing attack is also dangerous to everyday people, causing financial losses or resulting in stolen identities.

ZH 网络钓鱼攻击对普通人也很危险,会造成经济损失或导致身份被盗。

Transliteraasje wǎng luò diào yú gōng jī duì pǔ tōng rén yě hěn wēi xiǎn, huì zào chéng jīng jì sǔn shī huò dǎo zhì shēn fèn bèi dào。

EN In a clone phishing attack, cybercriminals clone and resend legitimate emails that now contain malware or malicious links in an attempt to trick recipients into clicking on them.

ZH 在克隆网络钓鱼攻击中,网络犯罪分子克隆合法电子邮件并加入恶意软件或恶意链接后再重新发送,试图欺骗收件人点击它们。

Transliteraasje zài kè lóng wǎng luò diào yú gōng jī zhōng, wǎng luò fàn zuì fēn zi kè lóng hé fǎ diàn zi yóu jiàn bìng jiā rù è yì ruǎn jiàn huò è yì liàn jiē hòu zài zhòng xīn fā sòng, shì tú qī piàn shōu jiàn rén diǎn jī tā men。

EN Differentiate between attack traffic and normal traffic and get unmetered protection with a multi-layer approach to cover all of your attack vectors.

ZH 區分攻擊流量和正常流量,透過多層方法獲得非計量保護,以防禦所有攻擊手段。

Transliteraasje qū fēn gōng jī liú liàng hé zhèng cháng liú liàng, tòu guò duō céng fāng fǎ huò dé fēi jì liàng bǎo hù, yǐ fáng yù suǒ yǒu gōng jī shǒu duàn。

EN The 1H 2021 Threat Report is here. From adaptive DDoS attack strategies to an explosion of new DDoS attack vectors, threat actors thrive on rapid innovation. Read the latest on our constantly changing threat landscape. Explore report

ZH 2021年上半年的 威胁报告在这里。 从自适应 DDoS 攻击策略到新的 DDoS 攻击载体的激增,威胁源起方在快速创新方面层出不尽。阅读有关我们不断变化的威胁形势的最新信息。 探索报告

Transliteraasje 2021nián shàng bàn nián de wēi xié bào gào zài zhè lǐ。 cóng zì shì yīng DDoS gōng jī cè lüè dào xīn de DDoS gōng jī zài tǐ de jī zēng, wēi xié yuán qǐ fāng zài kuài sù chuàng xīn fāng miàn céng chū bù jǐn。yuè dú yǒu guān wǒ men bù duàn biàn huà de wēi xié xíng shì de zuì xīn xìn xī。 tàn suǒ bào gào

Ingelsk Sineesk
ddos ddos

EN What is a Brute Force Attack? Type and Attack Prevention Tips

ZH 什么是暴力攻击?类型和攻击防范小贴士

Transliteraasje shén me shì bào lì gōng jī? lèi xíng hé gōng jī fáng fàn xiǎo tiē shì

EN Bot protection can help monitor web traffic for suspicious activity and lock out users when an attack is suspected. Bots can also predict suspicious activity such as multiple login attempts and alert the victim before an attack is completed.

ZH 机器人保护可以帮助监控 Web 流量是否有可疑活动,并在怀疑受到攻击时将用户锁定在外。机器人还可以预测可疑活动,例如多次登录尝试,并在攻击完成前提醒受害者。

Transliteraasje jī qì rén bǎo hù kě yǐ bāng zhù jiān kòng Web liú liàng shì fǒu yǒu kě yí huó dòng, bìng zài huái yí shòu dào gōng jī shí jiāng yòng hù suǒ dìng zài wài。jī qì rén hái kě yǐ yù cè kě yí huó dòng, lì rú duō cì dēng lù cháng shì, bìng zài gōng jī wán chéng qián tí xǐng shòu hài zhě。

EN Reduce your attack surface, detect threats, and respond to malware with a single solution. No need to get a new point product every time a new attack makes the news.

ZH 使用单一解决方案减少受攻击面,检测威胁,并回应恶意软件。 不需要每次出现新攻击时获取新的点式产品。

Transliteraasje shǐ yòng dān yī jiě jué fāng àn jiǎn shǎo shòu gōng jī miàn, jiǎn cè wēi xié, bìng huí yīng è yì ruǎn jiàn。 bù xū yào měi cì chū xiàn xīn gōng jī shí huò qǔ xīn de diǎn shì chǎn pǐn。

EN A sweeping attack that strikes all enemies in front of you for 214 Frost damage. This attack benefits from Killing Machine. Critical strikes with Frostscythe deal 4 times normal damage. Deals reduced damage beyond 5 targets.

ZH 對你面前的所有敵人施展一次橫掃攻擊,造成216點冰霜傷害。此攻擊可受益於殺戮酷刑。冰霜鐮刀致命一擊可造成一般攻擊的4倍傷害。超過5個目標時,造成的傷害降低。

Transliteraasje duì nǐ miàn qián de suǒ yǒu dí rén shī zhǎn yī cì héng sǎo gōng jī, zào chéng216diǎn bīng shuāng shāng hài。cǐ gōng jī kě shòu yì yú shā lù kù xíng。bīng shuāng lián dāo zhì mìng yī jī kě zào chéng yī bān gōng jī de4bèi shāng hài。chāo guò5gè mù biāo shí, zào chéng de shāng hài jiàng dī。

Toant {einresultaat} fan 50 oersettings