首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
admin
2017-04-13
63
问题
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook can now wirelessly transfer a wiretapping program to any mobile phone. The programs are inexpensive, and the transfer requires no special skill. The would-be spy needs to get his hands on your phone to press keys authorizing the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly ipyphone software has become widely available in the last year— and it confers stunning powers. The latest programs can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50. Vendors are loath to release sales figures. But some experts claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the U.S. at 3 percent. Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current embarrassment is partly the result of decisions by Apple, Microsoft and Research In Motion(producer of the BlackBerry)to open their phones to outside application-software developers, which created the opening for spyware. Antivirus and security programs developed for computers require too much processing power, even for smart phones. Although security programs are available for phones, by and large users haven’t given the threat much thought If the spying keeps spreading, that may change soon.
Which of the following is the best title for this text?
选项
A、How to Deal with Phone Spies?
B、Spyware is Here and There
C、Is Your Cell Phone Spying on You?
D、Security Programs for Phones
答案
C
解析
主旨大意题。本文提到监听软件蓬勃发展,越来越多的人面临被监听的潜在威胁,该软件的安装非常便捷,被监听的人也往往并不知晓。综合文中提到的各因素,C项(你的手机是否正在监视你?)是最合适的标题。本题也可使用排除法来解答。
转载请注明原文地址:https://kaotiyun.com/show/FnbZ777K
0
考研英语一
相关试题推荐
Americansnolongerexpectpublicfigures,whetherinspeechorinwriting,tocommandtheEnglishlanguagewithskillandgift.
Ifyouintendusinghumorinyourtalktomakepeoplesmile,youmustknowhowtoidentifysharedexperiencesandproblems.Your
Large,multinationalcorporationsmaybethecompanieswhoseupsanddownsseizeheadlines.Buttoafargreaterextentthanmos
Itusedtobesostraightforward(直接的).Ateamofresearchersworkingtogetherinthelaboratorywouldsubmittheresultsofthei
InanewstudyreleasedbyPew,researchersfindthatwhileMillennials—peoplewhowerebornafter1981—arebacktothepre-rece
InanewstudyreleasedbyPew,researchersfindthatwhileMillennials—peoplewhowerebornafter1981—arebacktothepre-rece
HansenstartsbyarguingthattheicemeltingonandaroundGreenlandandAntarcticawill【B1】______risesinsealevelthatarem
AmazontodayunveiledDashButtons,aneasywayforcustomersto【C1】______selectbulkgoods【C2】______aninternet-connectedbutto
Grillingmeatgivesitgreatflavour.Thistaste,though,comesataprice,sincetheprocesscreatesmoleculescalledpolycycli
【F1】Ican’thelpwonderingwhatCharlesDarwinwouldthinkifhecouldsurveythestateofhisintellectualachievementtoday.2
随机试题
甲持有乙公司34%的股份,为第一大股东。2007年1月,乙公司召开股东大会讨论其为甲向银行借款提供担保事宜。出席本次大会的股东(包括甲)所持表决权占公司发行在外股份总数的49%,除一名持有公司股份总额1%的小股东反对外,其余股东都同意乙公司为甲向银行借款提
你是一家大型企业的投资部经理,在大中华区主持项目的可行性研究。北京爆发“非典”疾病之后,你在北京考察半月之后,将提交一份“非典”疾病对于投资计划影响的专题报告。一份报告的基本结构中,分为哪几个部分?包含哪几种要素?
实用新型是指对产品的形状、构造或者其结合所提出的适于实用的新的技术方案。()
某患者经医生诊治为精神分裂症,其临床症状不包括
体温每升高1℃,成人心率平均每分钟约增加()。
风险管理与控制的核心包括()。Ⅰ.风险限额的确定Ⅱ.风险限额的分配Ⅲ.风险监控Ⅳ.风险的消除
导游人员未经旅行社委派,私自承揽导游业务,进行导游活动的,扣()。
有效教学的实质和核心是()
设f(x)在[0,1]上二阶可导,且|f(x)|≤a,|f”(x)|≤b,其中a,b都是非负常数,C为(0,1)内任意一点.写出f(x)在x=c处带Lagrange型余项的一阶泰勒公式;
通常双绞线系统的测试指标中,(29)是由于集肤效应、绝缘损耗、阻抗不匹配、连接电阻等因素,造成信号沿链路传输的损失。
最新回复
(
0
)