1·Malware is scanning through the memory in real time and looking for data.
恶意软件正在实时扫描内存并寻找数据。
2·And when you emailed back home, some or all of the malware may have migrated to your home server. This is not hypothetical.
而当你发送电子邮件回家,部分或所有这些恶意软件可能已经转移到你家里的主服务器上了,这是真的。
3·Some of the most sophisticated cyberattacks are multistage, in which a piece of malware penetrates a computer to use it as a platform for attacking yet another machine.
某些最复杂的网络袭击是多阶段进行的,首先一个恶意软件进入电脑,让其运行,再以此电脑为平台攻击另一台机器。
4·Many enterprises, fearing the spread of malware and the loss of productivity, data and money, have clamped down on use of social media networks in the workplace..
许多企业由于担心恶意软件的传播以及生产率、数据和金钱的流失,禁止在工作场合使用社会化媒体网络。
5·We would agree with this, but we would also point out that a lot of these scams and malware attacks still arrive by email.
我们也同意这点,但是我们也要指出许多钓鱼攻击和恶意软件仍然是通过邮件传播的。