首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2023-08-20
51
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible. Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna". In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
16. Who discovered the new technology of making any modern device broadcast invisible signals?
17. Why is the new hacking tactic groundbreaking?
18. What is the best way to protect people from the new hacking tactic?
选项
A、Because it cost $ 77 billion to develop.
B、Because it even puts data in offline devices in danger.
C、Because it aims at nuclear facilities and military bases.
D、Because it is revealed to reporters and the public.
答案
B
解析
转载请注明原文地址:http://tihaiku.com/zcyy/2942954.html
相关试题推荐
[originaltext]Everyyear,peopleinAmericauseenergyequaltoover30mil
[originaltext]Everyyear,peopleinAmericauseenergyequaltoover30mil
[originaltext]Ifsheernumbersprovideanyproof,America’suniversitiesar
[originaltext]Ifsheernumbersprovideanyproof,America’suniversitiesar
[originaltext]Youprobablyknowwhatamobileis,butthemobileI’mtalkin
[originaltext]W:Iwonderifyoucouldtellmealittlebitaboutyourjobasa
[originaltext]W:Iwonderifyoucouldtellmealittlebitaboutyourjobasa
[originaltext]W:Iwonderifyoucouldtellmealittlebitaboutyourjobasa
[originaltext]W:Charles,asasinger,doyouevermakeyourselfcrywhenyous
[originaltext]W:I’msofrustratedwiththisnewcomputerprogram.Ijustcan’t
随机试题
(浙江大学2010年试题)ThecharacterofEuropeaneducationdemandsthatthestudentd
ClimateChangeClimatechangeiswi
TherealandcentralpoweroftheBritishparliamentliesinthehandof______.A
甲状旁腺癌的声像图特征,下列错误的是A.肿瘤生长快,体积大 B.形态不规则,浸
( )时间段内,娱乐场所不得营业。A.每日晚上10时至次日上午6时 B.每日凌
关于佐剂增强免疫应答机制的叙述错误的是A.改变抗原物理性状 B.抗原在体内存留
女婴.10个月,母乳喂养,6个月开始添加辅食,生长发育良好,家长咨询其断奶最佳月
项目负债资金的筹措方式不包括( )。 A.信贷融资 B.债券融资
第②处的正确答案是()。 A.南人办 B.南政办 C.南政开办 D.南党
以下关于合同价款争议及造价鉴定的说法,正确的有()。A.因非承包人原因引起的暂停
最新回复
(
0
)