-
(单词翻译:双击或拖选)
A new survey of Internet security says the computer attacks are increasingly being used to make money, rather than simply to make mischief1. Virus writers are finding also ways to amplify2 their power—they're renting out robot armies of computers under their command. NPR's Larry Abramson has more.
In the old days the creators of computer viruses were in it for the glory, for the chance to brag3 about breaking into some well-guarded system. There is still a lot of boasting in the back alleys4 of the Internet, but increasingly the goal is profit. Vincent Riva is with the security company--Symantec.
There's an ecosystem5 which has been created as, where increasingly the full profit is the connection between those who find the vulnerabilities, those who write their exploits, and those who try to exploit it for money.
Symantec has just released its latest Internet security report which documents the ways that malicious6 computer code is being used to steal identities, attack businesses and send out spam. In the first six months of this year, Symantec counted nearly 2,000 vulnerabilities—2,000 security holes that could be used to break into computers remotely. On average someone attacks those holes less than a week after they're discovered, but Symantec says it usually takes two months before a security patch is developed. That means that evildoers have 7 weeks to march through those gateways7 and get inside the machines of unsuspecting users. And that's what Vincent Riva says another trend is building. Computer crackers8 are taking control of vast numbers of machines. They're developing what are known as botnets, and offering them for hire.
They become for rent. And we know available underground a number of these systems, are available for people who want to use it to make money.
The actual owners of these machines may be unaware9 that their computers have these alter egos10 and are being used to commit crimes. In one case brought by the Justice Department last year, a Massachusetts businessman was indicted11 for hiring a botnet operator and telling him to attack the computers of a competitor. Botnets have also been used to pump up revenues for advertisements by creating imaginary traffic to a website. And these commandeerd computers can also be called into service for fishing scams, which trick users into giving a passwords and other personal information. Thurston Hose has been monitoring the growth of botnets for a group called the HoneyNet project from his listening post in Germany. Hose says even beginners can amass12 large armies.
So we see several hundred/ thousands of compromised machines / each day and just the skill that is not very high for running a botnet.
The Symantec Internet security report brings news of other ominous13 trends. Vincent Riva says he seen the growth of viruses aimed at portable computing14 devices, PDAs and smart cell phones.
If we look at countries or regions of the world, which actually have a fast deployment15 of a smart phone, such as Japan, we actually see more crime in those areas, so for example we see the first fishing and float attacks occurring in Japan.
If you find these threats alarming, you're supposed to. This news is coming from a company that makes its money off the sale of security software. They see the world through their own particular lens. But even the best security software has holes, for example, researchers at UC Berkley have just announced they can reliably decode16 passwords and other information simply by recording17 the sounds of you typing on your keyboard.
Larry Abramson, NPR news.
In the old days the creators of computer viruses were in it for the glory, for the chance to brag3 about breaking into some well-guarded system. There is still a lot of boasting in the back alleys4 of the Internet, but increasingly the goal is profit. Vincent Riva is with the security company--Symantec.
There's an ecosystem5 which has been created as, where increasingly the full profit is the connection between those who find the vulnerabilities, those who write their exploits, and those who try to exploit it for money.
Symantec has just released its latest Internet security report which documents the ways that malicious6 computer code is being used to steal identities, attack businesses and send out spam. In the first six months of this year, Symantec counted nearly 2,000 vulnerabilities—2,000 security holes that could be used to break into computers remotely. On average someone attacks those holes less than a week after they're discovered, but Symantec says it usually takes two months before a security patch is developed. That means that evildoers have 7 weeks to march through those gateways7 and get inside the machines of unsuspecting users. And that's what Vincent Riva says another trend is building. Computer crackers8 are taking control of vast numbers of machines. They're developing what are known as botnets, and offering them for hire.
They become for rent. And we know available underground a number of these systems, are available for people who want to use it to make money.
The actual owners of these machines may be unaware9 that their computers have these alter egos10 and are being used to commit crimes. In one case brought by the Justice Department last year, a Massachusetts businessman was indicted11 for hiring a botnet operator and telling him to attack the computers of a competitor. Botnets have also been used to pump up revenues for advertisements by creating imaginary traffic to a website. And these commandeerd computers can also be called into service for fishing scams, which trick users into giving a passwords and other personal information. Thurston Hose has been monitoring the growth of botnets for a group called the HoneyNet project from his listening post in Germany. Hose says even beginners can amass12 large armies.
So we see several hundred/ thousands of compromised machines / each day and just the skill that is not very high for running a botnet.
The Symantec Internet security report brings news of other ominous13 trends. Vincent Riva says he seen the growth of viruses aimed at portable computing14 devices, PDAs and smart cell phones.
If we look at countries or regions of the world, which actually have a fast deployment15 of a smart phone, such as Japan, we actually see more crime in those areas, so for example we see the first fishing and float attacks occurring in Japan.
If you find these threats alarming, you're supposed to. This news is coming from a company that makes its money off the sale of security software. They see the world through their own particular lens. But even the best security software has holes, for example, researchers at UC Berkley have just announced they can reliably decode16 passwords and other information simply by recording17 the sounds of you typing on your keyboard.
Larry Abramson, NPR news.
点击收听单词发音
1 mischief | |
n.损害,伤害,危害;恶作剧,捣蛋,胡闹 | |
参考例句: |
|
|
2 amplify | |
vt.放大,增强;详述,详加解说 | |
参考例句: |
|
|
3 brag | |
v./n.吹牛,自夸;adj.第一流的 | |
参考例句: |
|
|
4 alleys | |
胡同,小巷( alley的名词复数 ); 小径 | |
参考例句: |
|
|
5 ecosystem | |
n.生态系统 | |
参考例句: |
|
|
6 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
7 gateways | |
n.网关( gateway的名词复数 );门径;方法;大门口 | |
参考例句: |
|
|
8 crackers | |
adj.精神错乱的,癫狂的n.爆竹( cracker的名词复数 );薄脆饼干;(认为)十分愉快的事;迷人的姑娘 | |
参考例句: |
|
|
9 unaware | |
a.不知道的,未意识到的 | |
参考例句: |
|
|
10 egos | |
自我,自尊,自负( ego的名词复数 ) | |
参考例句: |
|
|
11 indicted | |
控告,起诉( indict的过去式和过去分词 ) | |
参考例句: |
|
|
12 amass | |
vt.积累,积聚 | |
参考例句: |
|
|
13 ominous | |
adj.不祥的,不吉的,预兆的,预示的 | |
参考例句: |
|
|
14 computing | |
n.计算 | |
参考例句: |
|
|
15 deployment | |
n. 部署,展开 | |
参考例句: |
|
|
16 decode | |
vt.译(码),解(码) | |
参考例句: |
|
|
17 recording | |
n.录音,记录 | |
参考例句: |
|
|