• Number 2: Social media will simply bring viruses and Trojan horses into your network.

    FORBES: Top Ten Reasons To Ban Social Media Access At Work

  • Some people are testing different, and they hope more effective, viral Trojan horses.

    ECONOMIST: AIDS vaccines on trial | The

  • Unlike Shields Up, Security Check also scans for approximately 60 Trojan horses, which are malicious programs masquerading as other applications that you might unwittingly download.

    CNN: Symantec offers Web-based PC checkups

  • Viruses or Trojan horses could be used to skew an election.

    BBC: Silicon valley and the online election

  • The methodologies employed in these wide spread attacks is typically the combination of new vulnerabilities and custom Trojan horses delivered over the web or through email.

    FORBES: Bottom Line: Assume That You've Been Hacked

  • But no matter how good your antivirus program is, if you open a suspect email, you make yourself vulnerable to Trojan horses that steal email and bank-access information.

    FORBES: "Gameover" Bank Access Scam Channels Cybertheft

  • Security analysts say they've already seen all of the major online threats -- Trojan horses, viruses, worms -- spreading on smartphones, often through e-mail attachments sent to the phones.

    CNN: Smartphone security threats likely to rise

  • If we consider a virus to be the transport mechanism only, we will likely see payloads that we would identify as time and logic bombs, buffer overflow exploits, and Trojan horses.

    CNN: Technology - Analysis: Understanding viruses

  • Among 2, 500 firms surveyed last summer, 88% had antiviral software in place, yet an even larger percentage were infected by viruses, worms, Trojan horses or other "malware, " says Information Security magazine.

    FORBES: Scare Tactics

  • Of 2, 500 companies surveyed last summer, 88% had antiviral software in place, yet an even larger percentage were infected by viruses, worms, Trojan horses or other "malware, " says Information Security magazine.

    FORBES: Scare Tactics

  • Sites that exploit browser security holes to install software (such as malware, spyware, viruses, adware and Trojan horses) are in violation of our quality guidelines and may be removed from Google's index.

    FORBES: Magazine Article

  • Four out of five of them had been attacked by Trojan horses that sniffed out confidential information by logging keystrokes, recording internet sites visited, and reporting the findings to a third party.

    ECONOMIST: Guard yourself against identity theft

  • Sir Norman Bettison from the Association of Chief Police Officers, who, when asked if community projects are being used as "Trojan horses" to gather information, told the programme there was "no dedicated intelligence gathering" as part of the Prevent community work.

    BBC: UK to shift anti-terror strategy

  • The dangers associated with partnering with the enemies' organizational Trojan horses can only be compounded if the American people perceive re-labeling the "war" a "struggle" as meaning that it is a condition, not a conflict - something we have to get used to living with, not something we have to defeat, lest it destroy us.

    CENTERFORSECURITYPOLICY: War footing or GODSAVEUS

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定