首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2023-08-20
48
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible. Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna". In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
16. Who discovered the new technology of making any modern device broadcast invisible signals?
17. Why is the new hacking tactic groundbreaking?
18. What is the best way to protect people from the new hacking tactic?
选项
A、Cutting all the devices from the Internet.
B、Stopping using all the advanced laser printers.
C、Installing the high-tech anti-hacking softwares.
D、Using an AM radio to detect the signals.
答案
D
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/2942955.html
相关试题推荐
[originaltext]Everyyear,peopleinAmericauseenergyequaltoover30mil
[originaltext]Everyyear,peopleinAmericauseenergyequaltoover30mil
[originaltext]Ifsheernumbersprovideanyproof,America’suniversitiesar
[originaltext]Ifsheernumbersprovideanyproof,America’suniversitiesar
[originaltext]Youprobablyknowwhatamobileis,butthemobileI’mtalkin
[originaltext]W:Iwonderifyoucouldtellmealittlebitaboutyourjobasa
[originaltext]W:Iwonderifyoucouldtellmealittlebitaboutyourjobasa
[originaltext]W:Charles,asasinger,doyouevermakeyourselfcrywhenyous
[originaltext]W:Charles,asasinger,doyouevermakeyourselfcrywhenyous
[originaltext]W:I’msofrustratedwiththisnewcomputerprogram.Ijustcan’t
随机试题
HowtoPracticeEsperanto?Thereareatleast1,000,000
你是一家主要生产办公家具的公司的经理Lindy,下个月你要去纽约讨论一份重要合同的细节。你给Smith留一张便条,让他订10月6日飞往纽约和10月11日返回的机
[originaltext]Howlonghaveyoubeenworkinginthiscompany?[/originaltext][o
血管紧张素转化酶抑制剂可以A.抑制血管紧张素Ⅱ的生成 B.抑制体内胆固醇的生物
神经性聋时,听觉疲劳和听觉适应现象在程度和速度上均超过正常范围称为:()A.
可作为片剂润滑剂的是A.聚乙二醇6000B.乳糖C.糊精D.改良淀粉E.羟丙基甲
下列选项中不是缺乏维生素B的症状的是()A.夜盲 B.脚气病 C.口角炎
2020年北京市间接经济价值中,景观增值价值年值同比增量比文化旅游服务价值年
采用无套利均衡分析技术的要点就是“复制”证券的现金流特性与“被复制”证券的现金流
道路货流在方向上的不平衡性可用()来表示。A.回运系数 B.行程利用系数 C
最新回复
(
0
)