首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2024-04-17
21
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible. Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna". In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
16. Who discovered the new technology of making any modern device broadcast invisible signals?
17. Why is the new hacking tactic groundbreaking?
18. What is the best way to protect people from the new hacking tactic?
选项
A、Cutting all the devices from the Internet.
B、Stopping using all the advanced laser printers.
C、Installing the high-tech anti-hacking softwares.
D、Using an AM radio to detect the signals.
答案
D
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3559219.html
相关试题推荐
[originaltext]Facialexpressionscarrymeaningthatisdeterminedbysituat
[originaltext]Facialexpressionscarrymeaningthatisdeterminedbysituat
[originaltext]Facialexpressionscarrymeaningthatisdeterminedbysituat
[originaltext]W:Areyoubusythisevening?I’mgoingovertotheInternational
[originaltext]W:Hi,Sam.WelcometotheEllenShow.M:Thankyou.W:Sam,how
[originaltext]W:MaybeweshouldtakeFrontStreetthismorning.Theradioanno
[originaltext]W:MaybeweshouldtakeFrontStreetthismorning.Theradioanno
[originaltext]W:MaybeweshouldtakeFrontStreetthismorning.Theradioanno
[originaltext]W:MaybeweshouldtakeFrontStreetthismorning.Theradioanno
[originaltext]W:MaybeweshouldtakeFrontStreetthismorning.Theradioanno
随机试题
[originaltext]W:Thejobofraisingchildrenisatoughone.Andeachchildisd
某公路桥梁工程,其基础为钻孔灌注桩。该桥梁工程的施工任务由甲建筑公司总承包,其中
《窦娥冤》中窦娥发誓“血飞白练”所用典故是()A.岂不闻飞霜六月因邹衍 B.
“萨满舞”起源于封建社会的渔猎生活。()
【教学过程】 (一)生活导入 【提出问题】 ①为什么出汗之后使用电器更容易发生触电事故? ②人体在剧烈运动之后为何要及时补充水分和盐分? 【
血浆中,下列哪种物质不是在肝脏合成的A.前白蛋白B.白蛋白C.凝血酶原D.肾素E
下列行为不得开具增值税专用发票的是()A.向某个人销售锅炉 B.
(2022年真题)学校社会工作者小顾以“结对子”方式,运用朋辈助力法引导某校学生
以需配人,以岗定人指的是()。A.人员配备计划 B.人力资源需求计划
已知某工程的计划工作预算费用为5000万元,已完工作预算费用为6000万元,已完
最新回复
(
0
)