首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook
admin
2019-09-30
64
问题
Don’t talk: your cell phone may be eavesdropping. Thanks to recent developments in "spy phone" software, a do-it-yourself spook can now wirelessly transfer a wiretapping program to any mobile phone. The programs are inexpensive, and the transfer requires no special skill. The would-be spy needs to get his hands on your phone to press keys authorizing the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly ipyphone software has become widely available in the last year— and it confers stunning powers. The latest programs can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50. Vendors are loath to release sales figures. But some experts claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the U.S. at 3 percent. Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current embarrassment is partly the result of decisions by Apple, Microsoft and Research In Motion(producer of the BlackBerry)to open their phones to outside application-software developers, which created the opening for spyware. Antivirus and security programs developed for computers require too much processing power, even for smart phones. Although security programs are available for phones, by and large users haven’t given the threat much thought If the spying keeps spreading, that may change soon.
Which of the following is true of the "spy phone"?
选项
A、It’s a complicated and inexpensive wireless transfer software.
B、It can be downloaded to the phone for free.
C、The download takes less than the time of downloading a ringtone.
D、Its targets are totally unaware that they are spied.
答案
D
解析
事实细节题。第二段末句提到,被监听的人对此是一无所知的:不管是通话记录还是手机账单都不会有秘密传输数据的记录,D项与之相符。
转载请注明原文地址:https://kaotiyun.com/show/eve4777K
0
考研英语二
相关试题推荐
Thecellphone,adevicewehavelivedwithformorethanadecade,offersagoodexampleofapopulartechnology’sunforeseensi
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000:ayearlatershebecamepresidentofBrownUni
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000:ayearlatershebecamepresidentofBrownUni
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
TheInternetaffordsanonymitytoitsusers,ablessingtoprivacyandfreedomofspeech.Butthatveryanonymityisalsobehind
In2010,afederaljudgeshookAmerica’sbiotechindustrytoitscore.CompanieshadwonpatentsforisolatedDNAfordecades--b
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000;ayearlatershebecamepresidentofBrownUni
RuthSimmonsjoinedGoldmanSachs’sboardasanoutsidedirectorinJanuary2000;ayearlatershebecamepresidentofBrownUni
随机试题
试论庞德社会法学的基本纲领。
根据亨利·明茨伯格的一项被广为引用的研究,管理者扮演着十种角色,可归为人际角色、信息角色和_____三大类。
患者女,52岁。肩周炎3年,肩关节活动受限,前展110°,外展120°,内旋90°,外旋45°。支配肩前屈的肌肉是
一般中长期贷款都选用()。
下列桥台中不属于拱桥轻型挢台的有();
账务处理程序也叫会计核算程序,它是指( )相结合的方式。
固定资产投资保持较快增长。上半年,500万元以上固定资产投资完成6617.3亿元,增长18.1%。其中,第三产业投资增长29.9%,分别高于第一、第二产业8.6和19.5个百分点,与全省投资增长的贡献率达到63.4%;三次产业投资比重由去年同期的2.0:5
在一项关于商业广告的研究中,研究人员将被试人员分成两组,均为他们提供相同的零食。其中一组被试人员先观看10分钟的热门喜剧短片,然后再观看5分钟关于食品的商业广告:另外一组被试人员则充当参照小组,他们一直观看15分钟的热门喜剧短片。研究发现,观看食品商业广告
1905年8月20日,孙中山和黄兴、宋教仁等人在日本东京成立了近代中国第一个领导资产阶级革命的全国性政党,即
Thetaxidriverwasamaninhislatethirties.Hepickedmeupand【C1】______metomyplace.Iusuallyliketohavebrief【C2】___
最新回复
(
0
)