最新黑客漏洞利用,最新漏洞资讯。
漏洞利用(exloit)是一个揭示或利用安全性漏洞的程序。
An exploit is a program that demonstrates or exploits the vulnerability.
各种入侵思路与技术和漏洞利用交流、让你成为脚本安全攻防高手。
A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.
当这一漏洞利用得以正名之际,谷歌也更新了正在开发中的铬浏览器版本。
Google updated its version of Chrome in development when word of this exploit came out.
漏洞分析是指对已发现漏洞的细节进行深入分析,澄清漏洞成因,为漏洞利用、补救提供技术支持。
Vulnerability analysis is to analyze further the known vulnerability to figure out their causes with the aim to offer technical support for exploiting or saving them.
恶意软件是隐藏的(软件漏洞利用)在媒体和信息档案最快的国家之一和不可办法来宣传这些威胁世界各地。
Malware that is hidden (software vulnerability exploits) within media and information files is one of the fastest and undetectable approaches to propagate these threats around the world.
在调查“影子经纪人”(ShadowBrokers)泄露一系列NSA开发漏洞利用期间被曝光,这起机密窃取事件浮出水面。
In the investigation shadow brokers (ShadowBrokers) leaked a series of NSA exploit vulnerabilities were exposed during the use of this secret theft incident surfaced.
由新西兰安全研究者Simon Howard运营的备受争议的“零病毒检测”竞赛允许各个参赛队伪装计算机病毒代码和漏洞利用代码样本。
The controversial Race to Zero contest, run by New Zealand security researcher Simon Howard, allowed each team to try to obfuscate real computer viruses and exploit code samples.
由于ChronicDevTeam不希望两个漏洞利用同时出现(因为苹果可能一次性修补这两个漏洞),他们决定暂时停止其以SHAtter为基础的工具。
Because the Chronic Dev Team does not want there to be two exploits in the wild at the same time (as Apple could then patch both at once), they've decided to withhold their SHAtter-based tool for now.
另一种是找到确保软件开发人员编写的代码中有更少的缺陷的方法,这样黑客就有更少的安全漏洞可以利用。
Another is to find ways to ensure that software developers produce code with fewer flaws in it so that hackers have fewer security holes to exploit.
“开曼群岛利用了法律的漏洞——金融制度也没有变得更弱。”欧洲一监管者说道。
"Cayman takes advantage of a legitimate loophole—and the financial system is none the weaker for it," says one regulator in Europe.
每个系统都有漏洞,如果小偷具备相关知识,理论上就可以对其加以利用。
Every one of them has vulnerabilities that a knowledgeable thief could theoretically exploit.
每个系统都有漏洞,理论上,具备相关知识的小偷就可以对其加以利用。
Every system has vulnerabilities that a knowledgeable thief could theoretically exploit.
我们每天的生活和公共安全依赖于电网,但潜在的对手可以利用网络漏洞对它们进行大规模破坏。
Our daily lives and public safety depend onpower and electric grids, but potential adversaries could use cybervulnerabilities to disrupt them on a massive scale.
如果威胁者利用了这个漏洞,则会引起浏览器崩溃。
This vulnerability, if exploited by a threat, could result in a browser crash.
这些信息用于帮助发现潜在的安全“漏洞”,此类弱点可能被利用向客户发起攻击。
This information is used to help identify potential security "holes" that may be weak points for attacks against customers.
识别了所有要评估的资产之后,下一个步骤就是识别并评估每种资产可能被黑客或攻击者利用的漏洞。
After you get all the assets for assessment identified, the next step is to identify and assess the vulnerabilities of each asset that a hacker or attacker could maliciously exploit.
扫描发现的每个系统,发现漏洞并利用该漏洞。
Scan each system discovered to uncover vulnerabilities, and move toward exploiting the vulnerability.
要防止黑客利用该漏洞,您不仅必须重构带有输入确认的查询示例,还必须确保黑客不能登录。
To prevent the hacker from exploiting the vulnerability, not only must you re-construct the query example with input validation, you must also ensure the hacker cannot log in.
当然这一条款也成为了在高盛教唆和协助下的希腊可以利用的漏洞。
That’s the same loophole Greece was able to exploit, in line with the rules, aided and abetted by Goldman Sachs.
这种情况的出现是偶然的还是为了满足项目时限和预算有意为之,这与是否会利用该漏洞无关。
Whether it happens accidentally or intentionally to meet timelines and budgets is irrelevant if the vulnerability is exploited.
与IPv 4类似,在漏洞被成功利用时,会受到攻击。
Like IPv4, it is subject to attacks when vulnerabilities are successfully exploited.
您的目标是将漏洞被利用的风险减轻到可接受的程度。
Your goal is to mitigate the risks of exploiting vulnerabilities to an acceptable level.
此服务将漏洞映射到多个威胁上,即相同的漏洞可能被多个威胁所利用。
This service maps vulnerability onto several threats, meaning that the same vulnerability can be exploited by several threats.
即使是辩护者们也都承认,无论何种税收刺激方案,雇主们和他们的会计将利用这个漏洞。
Even advocates acknowledge that, as with any tax incentive, employers and their accountants will take advantage of loopholes.
双方都认为它有漏洞,而公司一直竞相利用它的漏洞。
Both sides agree it has loopholes, which companies have been racing to exploit.
所以说,现在利用这一漏洞进行的攻击被称为“零日”攻击。
In turn the current exploiting of the flaw is known as a "zero-day" attack.
第三步是提供补救措施,包括将安全装置恰当放置来降低漏洞被利用的风险。
The third step is to provide remedies including putting safeguards in place to mitigate the risks of exploiting vulnerabilities or fixing them.
对运行时异常的处理不足是黑客将尝试利用的另一漏洞。
The poor handling of runtime exceptions is another area that hackers will attempt to exploit.
对运行时异常的处理不足是黑客将尝试利用的另一漏洞。
The poor handling of runtime exceptions is another area that hackers will attempt to exploit.
应用推荐