英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语


时间:2013-12-27 03:26来源:互联网 提供网友:mapleleaf   字体: [ ]

   Internet security

  An anonymous1 foe2
  Hackers4 hit big companies, the IMF and the headlines
  Jun 16th 2011 | SAN FRANCISCO | from the print edition
  DEFENCE companies such as Lockheed Martin have seen some of their cyber-defences penetrated6. Sony, Google, Citigroup and other firms have had sensitive customer data swiped by high-tech7 intruders. The IMF has been the victim of a digital attack, as has the website of America’s Senate. And a hackers’ collective, called Anonymous, has threatened to launch an online assault on the computer systems of America’s Federal Reserve unless its chairman, Ben Bernanke, agrees to step down.
  洛克西德马丁公司虽作为国防军企,却也意识到其部分网络防御被黑客所渗透。入侵者以其较高的技术窃取了索尼,谷歌,花旗集团等公司的客户敏感数据。国际货币基金组织成为了这次数字化入侵的受害者,美国参议院的官网也不能幸免。一个叫做“佚名”的黑客组织扬言,如果美联储的主席Ben Bernanke不愿下台,那就要对美联储的计算机系统发起网上攻击。
  These and other events—such as the attack on the public website of the CIA, which was disrupted briefly8 on June 15th—have led to speculation9 that there has been a big increase in the threat posed by hackers in recent months. They have also reinforced a belief in some quarters that America is already engaged in a cyber war of sorts, most notably10 with China. Yet such claims are controversial.
  Although some security experts think hacking11 activity has hit a new high, others say such claims are overblown. They point out that laws in some states in America now require firms to reveal if their defences have been breached12, which means more hacking cases are coming to light that would previously13 have been buried. High-profile attacks, such as the ones on the Senate website, also get plenty of media coverage14, fuelling talk of an epidemic15.
  The vast majority of the hacking that does take place is still perpetrated by different sets of private hackers rather than by cyber spooks. Take “hacktivists”, members of such groups as Anonymous and Lulz Security, the outfit16 that has claimed responsibility for attacking the Senate’s and the CIA’s sites. (To “lulz” means to laugh at someone’s misfortune in jargon17.) Loosely organised and motivated by causes rather than money, these online rebels shot to prominence18 last year. They targeted firms such as MasterCard that shunned19 WikiLeaks after the transparency group began releasing secret diplomatic cables. And they thrive on the oxygen of publicity20, boasting of their exploits on Twitter and other social-media services. Anonymous even announced its intention to target the Fed by posting a video on YouTube. This listed all kinds of recriminations against the central bank, including plenty of bizarre ones such as “crimes against humanity”, scrolled21 down against a backdrop of eerie22 face masks that have become Anonymous’s calling card (see picture above).
  Hacktivists’ assaults on state targets have prompted governments to try rounding them up. On June 10th Spanish police arrested three men that they claim are core members of Anonymous, which responded by causing a police website to crash. Then on June 13th police in Turkey rounded up another 32 alleged23 hackers from the group, which had recently attacked a couple of official websites, protesting plans to increase policing of web traffic.
  Dmitri Alperovitch of McAfee, a web-security company, reckons that these and future raids will ensure that hacktivism declines as a source of online attacks within six to 12 months. But other experts warn that by trumpeting24 the arrest of Anonymous members, instead of simply labelling them as common-or-garden hackers, governments are boosting the outfit’s standing25. In the eyes of potential recruits such as young “script kiddies”, who first turn to hacking chiefly as a test of their programming skills, Anonymous may now seem more attractive.
  来自网络安全公司迈克菲的副总裁Dmitri Alperovitch认为,这些和未来的清剿行动会保障未来6到12个月的以黑客行动主义作为精神指导的网络攻击行为的下降。但是其他的专家警告说,政府这种吹嘘逮捕黑客组织成员的行为,与其说是简单地盖棺论调,给他们贴上不过如此的黑客标签,不如说是在变相承认其组织的地位。许多潜在的新人,比如年轻的“脚本小子”们,都因为入侵系统可以测试他们的编程能力而进入黑客行业,“佚名”组织对于他们来说现在似乎更有吸引力了。
  While hacktivists are gathering26 speed, another source of hacking—organised-crime groups—are going about their business as usual. But that means they are using increasingly sophisticated techniques to extract passwords and other personal information from their victims. This then gives them access to data they can profit from in various ways. These gangs are behind some of the biggest data breaches27 that companies have owned up to (see chart). They also often launch cyber-attacks using “botnets”, or networks of computers that have been taken over without their owners’ knowledge.
  Code red 红色代码
  Such ploys28 can make it hard to identify exactly who is behind a particular online assault, says Adam Vincent of Cyber Squared, another security firm. In China things are particularly unclear. Jayson Street, a security researcher who has written a book on dissecting29 hacks30, reckons the Chinese government itself is struggling to contain hacking within the country. He recounts how the website of one regional government he studied turned out to have been compromised by hackers who had made it part of a botnet. Chinese cyber-crooks are only too happy to rent out their networks to other gangs and governments who want to launch attacks using them. North Korea and Russia are said to be among the countries that have taken advantage of such offers.
  来自另一家网络安全公司Cyber Squared的Adam Vincent说,这样(僵尸网络的)形式的攻击真的很难定位到某次入侵的幕后真凶是谁。在中国事情就更扑朔迷离了。研究网络安全的Jayson Street曾写过一本剖析黑客行为的书,他认为中国政府自身也在挣扎着控制黑客行为于境内。他详述了他所研究的一个地方政府网站是怎么在黑客们的控制下“蜕变”到僵尸网络的一部分的。中国的网络犯罪分子倒是希望能够把他们的网络租给其他黑客帮派或者政府,供其发起攻击。朝鲜和俄罗斯据说也是利用这种机会来获取好处的。
  This does not mean that the Chinese government is innocent of all of the hacking charges levelled against it. A recent study by McAfee of “SQL injections”, a technique used to penetrate5 databases, showed that around half of the reported attacks in the first quarter of 2011 originated from China. Given the scale of such activity, it is likely that at least some of these were launched by Chinese cyberspies. Google has also dropped heavy hints that the Chinese government was behind a recent hack3 of Gmail, its web-based mail service, which let online snoopers read the e-mails of high-ranking American officials and those from some other countries.
  But China is far from the only country engaged in cyber-espionage. It is surely no coincidence that according to McAfee’s statistics the second-largest source of SQL injections in the first quarter was none other than America. Such probing of a rival’s systems is hardly new, though it has assumed an exaggerated importance because of all the feverish31 talk of “cyber-warfare”.
  According to a report on cyber-security issued earlier this year by the Organisation32 for Economic Co-operation and Development, the chances of a conflict fought solely33 in the electronic world are extremely slim. The same report also warns that many high-tech attacks described as acts of cyberwar, including the antics of hacktivists, do not merit the label. That is surely right. Even so they are no laughing—or lulzing—matter.


1 anonymous lM2yp     
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
2 foe ygczK     
  • He knew that Karl could be an implacable foe.他明白卡尔可能会成为他的死敌。
  • A friend is a friend;a foe is a foe;one must be clearly distinguished from the other.敌是敌,友是友,必须分清界限。
3 hack BQJz2     
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
4 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
5 penetrate juSyv     
  • Western ideas penetrate slowly through the East.西方观念逐渐传入东方。
  • The sunshine could not penetrate where the trees were thickest.阳光不能透入树木最浓密的地方。
6 penetrated 61c8e5905df30b8828694a7dc4c3a3e0     
adj. 击穿的,鞭辟入里的 动词penetrate的过去式和过去分词形式
  • The knife had penetrated his chest. 刀子刺入了他的胸膛。
  • They penetrated into territory where no man had ever gone before. 他们已进入先前没人去过的地区。
7 high-tech high-tech     
  • The economy is in the upswing which makes high-tech services in more demand too.经济在蓬勃发展,这就使对高科技服务的需求量也在加大。
  • The quest of a cure for disease with high-tech has never ceased. 人们希望运用高科技治疗疾病的追求从未停止过。
8 briefly 9Styo     
  • I want to touch briefly on another aspect of the problem.我想简单地谈一下这个问题的另一方面。
  • He was kidnapped and briefly detained by a terrorist group.他被一个恐怖组织绑架并短暂拘禁。
9 speculation 9vGwe     
  • Her mind is occupied with speculation.她的头脑忙于思考。
  • There is widespread speculation that he is going to resign.人们普遍推测他要辞职。
10 notably 1HEx9     
  • Many students were absent,notably the monitor.许多学生缺席,特别是连班长也没来。
  • A notably short,silver-haired man,he plays basketball with his staff several times a week.他个子明显较为矮小,一头银发,每周都会和他的员工一起打几次篮球。
11 hacking KrIzgm     
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
12 breached e3498bf16767cf8f9f8dc58f7275a5a5     
攻破( breach的现在分词 ); 破坏,违反
  • These commitments have already been breached. 这些承诺已遭背弃。
  • Our tanks have breached the enemy defences. 我方坦克车突破了敌人的防线。
13 previously bkzzzC     
  • The bicycle tyre blew out at a previously damaged point.自行车胎在以前损坏过的地方又爆开了。
  • Let me digress for a moment and explain what had happened previously.让我岔开一会儿,解释原先发生了什么。
14 coverage nvwz7v     
  • There's little coverage of foreign news in the newspaper.报纸上几乎没有国外新闻报道。
  • This is an insurance policy with extensive coverage.这是一项承保范围广泛的保险。
15 epidemic 5iTzz     
  • That kind of epidemic disease has long been stamped out.那种传染病早已绝迹。
  • The authorities tried to localise the epidemic.当局试图把流行病限制在局部范围。
16 outfit YJTxC     
  • Jenney bought a new outfit for her daughter's wedding.珍妮为参加女儿的婚礼买了一套新装。
  • His father bought a ski outfit for him on his birthday.他父亲在他生日那天给他买了一套滑雪用具。
17 jargon I3sxk     
  • They will not hear critics with their horrible jargon.他们不愿意听到评论家们那些可怕的行话。
  • It is important not to be overawed by the mathematical jargon.要紧的是不要被数学的术语所吓倒.
18 prominence a0Mzw     
  • He came to prominence during the World Cup in Italy.他在意大利的世界杯赛中声名鹊起。
  • This young fashion designer is rising to prominence.这位年轻的时装设计师的声望越来越高。
19 shunned bcd48f012d0befb1223f8e35a7516d0e     
v.避开,回避,避免( shun的过去式和过去分词 )
  • She was shunned by her family when she remarried. 她再婚后家里人都躲着她。
  • He was a shy man who shunned all publicity. 他是个怕羞的人,总是避开一切引人注目的活动。 来自《简明英汉词典》
20 publicity ASmxx     
  • The singer star's marriage got a lot of publicity.这位歌星的婚事引起了公众的关注。
  • He dismissed the event as just a publicity gimmick.他不理会这件事,只当它是一种宣传手法。
21 scrolled 313315b0796120af40f9657f89e85dc9     
adj.具有涡卷装饰的v.(电脑屏幕上)从上到下移动(资料等),卷页( scroll的过去式和过去分词 );(似卷轴般)卷起;(像展开卷轴般地)将文字显示于屏幕
  • Wherever the drop target can possibly be scrolled offscreen, the program needs to auto-scroll. 无论拖放的目标对象是否在屏幕之外,程序都需要自动滚动。 来自About Face 3交互设计精髓
  • If It'still is then you've not scrolled up enough lines. 如果还在说明你向上滚动的行数不够。 来自互联网
22 eerie N8gy0     
  • It's eerie to walk through a dark wood at night.夜晚在漆黑的森林中行走很是恐怖。
  • I walked down the eerie dark path.我走在那条漆黑恐怖的小路上。
23 alleged gzaz3i     
  • It was alleged that he had taken bribes while in office. 他被指称在任时收受贿赂。
  • alleged irregularities in the election campaign 被指称竞选运动中的不正当行为
24 trumpeting 68cf4dbd1f99442d072d18975013a14d     
  • She is always trumpeting her son. 她总是吹嘘她儿子。
  • The wind is trumpeting, a bugle calling to charge! 风在掌号。冲锋号! 来自汉英文学 - 散文英译
25 standing 2hCzgo     
  • After the earthquake only a few houses were left standing.地震过后只有几幢房屋还立着。
  • They're standing out against any change in the law.他们坚决反对对法律做任何修改。
26 gathering ChmxZ     
  • He called on Mr. White to speak at the gathering.他请怀特先生在集会上讲话。
  • He is on the wing gathering material for his novels.他正忙于为他的小说收集资料。
27 breaches f7e9a03d0b1fa3eeb94ac8e8ffbb509a     
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
28 ploys b429662db6da2d53b0dbfb464c042760     
n.策略,手法( ploy的名词复数 )
  • The boss tried many ploys to get customers into the store. 老板用尽各种伎俩引顾客上门。 来自辞典例句
  • She tried many ploys to get the boy interested in her. 她试过很多伎俩去赢取男孩的青睐。 来自辞典例句
29 dissecting 53b66bea703a0d1b805dfcd0804dd1b3     
v.解剖(动物等)( dissect的现在分词 );仔细分析或研究
  • Another group was dissecting a new film showing locally. 另外一批人正在剖析城里上演的一部新电影。 来自辞典例句
  • Probe into Dissecting Refraction Method Statics Processing under Complicated Surface Conditions. 不同地表条件下土壤侵蚀的坡度效应。 来自互联网
30 hacks 7524d17c38ed0b02a3dc699263d3ce94     
  • But there are hacks who take advantage of people like Teddy. 但有些无赖会占类似泰迪的人的便宜。 来自电影对白
  • I want those two hacks back here, right now. 我要那两个雇工回到这儿,现在就回。 来自互联网
31 feverish gzsye     
  • He is too feverish to rest.他兴奋得安静不下来。
  • They worked with feverish haste to finish the job.为了完成此事他们以狂热的速度工作着。
32 organisation organisation     
  • The method of his organisation work is worth commending.他的组织工作的方法值得称道。
  • His application for membership of the organisation was rejected.他想要加入该组织的申请遭到了拒绝。
33 solely FwGwe     
  • Success should not be measured solely by educational achievement.成功与否不应只用学业成绩来衡量。
  • The town depends almost solely on the tourist trade.这座城市几乎完全靠旅游业维持。
TAG标签:   经济学人  网络安全
最新评论 查看所有评论
发表评论 查看所有评论