首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
admin
2017-04-13
46
问题
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook can now wirelessly transfer a wiretapping program to any mobile phone. The programs are inexpensive, and the transfer requires no special skill. The would-be spy needs to get his hands on your phone to press keys authorizing the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly ipyphone software has become widely available in the last year— and it confers stunning powers. The latest programs can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50. Vendors are loath to release sales figures. But some experts claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the U.S. at 3 percent. Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current embarrassment is partly the result of decisions by Apple, Microsoft and Research In Motion(producer of the BlackBerry)to open their phones to outside application-software developers, which created the opening for spyware. Antivirus and security programs developed for computers require too much processing power, even for smart phones. Although security programs are available for phones, by and large users haven’t given the threat much thought If the spying keeps spreading, that may change soon.
According to Paragraph 4, Spyware
选项
A、increases the processing power of iPhones.
B、enlarges the pool of potential victims.
C、is developed by law-enforcement agencies.
D、might serve the devil.
答案
D
解析
事实细节题。根据题干定位在第四段。该段末句提到监听软件可能会落人犯罪分子之手,这一点很令人担忧.故选D项。
转载请注明原文地址:https://kaotiyun.com/show/UnbZ777K
0
考研英语一
相关试题推荐
Everybodylovesafatpayrise.Yetpleasureatyourowncanvanishifyoulearnthatacolleaguehasbeengivenabiggerone.I
Ifyouintendusinghumorinyourtalktomakepeoplesmile,youmustknowhowtoidentifysharedexperiencesandproblems.Your
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
Large,multinationalcorporationsmaybethecompanieswhoseupsanddownsseizeheadlines.Buttoafargreaterextentthanmos
AmazontodayunveiledDashButtons,aneasywayforcustomersto【C1】______selectbulkgoods【C2】______aninternet-connectedbutto
Readthefollowingtextandanswerthequestionsbyfindinginformationfromtheleftcolumnthatcorrespondstoeachofthemar
TothepeopleofEurope,cuckoosareharbingersofspring.ToEuropeanbirds,though,thecuckoo’scallislesswelcome—forcuck
Readthefollowingtextandanswerthequestionsbyfindinginformationfromtheleftcolumnthatcorrespondstoeachofthemar
Oftenreferredtoas"theheartofafactoringorganization,"thecreditdepartmentisresponsibleforgrantingcredittoclient
Darwindiscoveredtwomajorforcesinevolution—naturalselectionandsexualselectionandwrotethreeradicalscientificmaster
随机试题
A.风湿在表之痹证B.下焦虚寒之膏淋C.脾虚湿盛,气滞水泛之皮水证D.痹证日久,肝肾两虚,气血不足证羌活胜湿汤的主治是
A.子宫体B.子宫下段C.子宫颈D.子宫收缩力E.肛提肌临产后成为子宫下段一部分的是
下列不属于非细胞毒性类抗肿瘤药是
一台三相异步电动机的机械特性如图所示,其额定工作点A的参数为:nN=1430r/min,TN=67N.m。若负载转矩为98N.m,则带此负载()。
施工企业应缴纳的城市维护建设税的计税依据为()。
【背景资料】某框剪结构办公楼,建筑面积16790m2,地下1层,地上10层,预制桩筏板基础。剪力墙混凝土设计强度为C40,地下防水设计采用卷材防水和混凝土自防水相结合的方案,地下室无后浇带,地下室隔墙采用砖砌体,基坑边坡按1:1放坡。桩基础和卷材防水由总承
商业银行资产的流动性是指()。
采用邻接表存储的图的深度优先遍历算法类似于树的(22),用邻接表存储的图的广度优先遍历算法类似于树的(23),判断有向图是否存在回路,除了可以利用拓扑排序方法外,还可以利用(24)。
ForCressidaitwasspirituallylikesomepaganvegetationriteofregenerationandrenewal.Inthesunburntpepper-and-saltof
Nooneknowsexactlyhowmanydisabledpeoplethereareintheworld,but【C1】______suggestthefigureisover450million.Then
最新回复
(
0
)