在线英语听力室

英语新闻听写 黑客数秒内就能偷走特斯拉汽车!

时间:2020-10-13 08:34:34

搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。

(单词翻译)

 

According to Business Insider, a group of researchers show how a Tsela Model S can be hacked1 and stolen within minutes.

据“Business Insider”报道,一群研究员展示如何在数分钟内入侵并偷走特斯拉“Model S”。

Researchers from KU Leuven university in Belgium demonstrated that hackers2 can secretly clone the key fob of a Tesla Model S and steal the car within seconds — and with only $600 worth of simple computing3 and radio equipment.

比利时鲁汶大学的研究员证明,黑客能暗地里克隆特斯拉“Model S”的遥控钥匙并在数秒内偷走该车——只需600美元的简单计算机和无线电设备。

The researchers brought their findings to Tesla — which rewarded them for exposing the security flaw — and Tesla responded by adding a software update with two factor authentication4 using a PIN code, and it offered updated key fobs to customers with additional security.

这群研究员把他们的发现带到了特斯拉——该公司会奖励他们暴露安全漏洞——特斯拉的应对措施是增加带有使用PIN码的双重身份验证的软件升级,并且该公司还向顾客提供了升级的遥控钥匙来作为额外的安全措施。

However, if Model S drivers haven't updated their software and don't have a new key fob, their cars are still theoretically vulnerable to this type of theft.

但如果“Model S”的司机没有升级他们的软件且又没有新的遥控钥匙,从理论上讲,他们的汽车依然容易遭遇这类偷盗。


分享到:


点击收听单词发音收听单词发音  

1 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
2 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
3 computing tvBzxs     
n.计算
参考例句:
  • to work in computing 从事信息处理
  • Back in the dark ages of computing, in about 1980, they started a software company. 早在计算机尚未普及的时代(约1980年),他们就创办了软件公司。
4 authentication jO5yS     
鉴定,认证
参考例句:
  • Computer security technology includes mainly:Authentication,Encryption,Access Control,Auditing and so on.计算机网络安全技术主要有: 认证授权、数据加密、访问控制、安全审计等。

本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。