大学职业资格刷题搜题APP
下载APP
课程
题库模板
WORD模板下载
EXCEL模板下载
题库创建教程
创建题库
登录
logo - 刷刷题
创建自己的小题库
搜索
【单选题】

Don’t talk: Your mobile phone may be eavesdropping (窃听). Thanks to recent developments in "spy-phone" software, a do-it-yourself spook (播放器) can now wirelessly transfer a wiretapping programme to any mobile phone. The programmes are inexpensive, and the transfer requires no special skills. The would-be spy needs to get his hands on your phone to press keys authorising the download, but it takes just a few minutes—about the time needed to download a ringtone.
This new generation of user-friendly spy-phone software has become widely available in the past year—and it confers stunning powers. The latest programmes can silently turn on handset microphones even when no call is being made, allowing a spy to listen to voices in a room halfway around the world. Targets are none the wiser: Neither call logs nor phone bills show records of the secretly transmitted data.
More than 200 companies sell spy-phone software online, at prices as low as $50 (a few programmes cost more than $300). Vendors are not willing to release sales figures. But some experts—private investigators and consultants in counter-wiretapping, computer-security software and telecommunications market research—claim that a surprising number of people carry a mobile that has been compromised, usually by a spouse, lover, parent or co-worker. Many employees, experts say, hope to discover a supervisor’s dishonest dealings and tip off the top boss anonymously. Max Maiellaro, head of Agata Christie Investigation, a private-investigation firm in Milan, estimates that 3 percent of mobiles in France and Germany are tapped, and about 5 percent or so in Greece, Italy, Romania and Spain. James Atkinson, a spy-phone expert at Granite Island Group, a security consultancy in Gloucester, Massachusetts, puts the number of tapped phones in the US at 3 percent. (These approximations do not take into account government wiretapping.) Even if these numbers are inflated, clearly many otherwise law-abiding citizens are willing to break wiretapping laws.
Spyware thrives on iPhones, BlackBerrys and other smart phones because they have ample processing power. In the United States, the spread of GSM networks, which are more vulnerable than older technologies, has also enlarged the pool of potential victims. Spyware being developed for law-enforcement agencies will accompany a text message and automatically install itself in the victim’s phone when the message is opened, according to an Italian developer who declined to be identified. One worry is that the software will find its way into the hands of criminals.
The current predicament (尴尬的境地) is partly the result of decisions by Apple, Microsoft and Research In Motion (producer of the BlackBerry) to open their phones to outside application-software developers, which created the opening for spyware. Anti-virus and security programmes developed for computers require too much processing power, even for smart phones. Although security programmes are available for phones, by and large users haven’t given the threat much thought. If the spying keeps spreading, that may change soon. What does the passage mainly talk about

A.
The development of smart phones.
B.
The development of spy-phone software.
C.
The remote tapping on mobile phones.
D.
The achievement on counterspy.
题目标签:播放窃听尴尬
手机使用
分享
复制链接
新浪微博
分享QQ
微信扫一扫
微信内点击右上角“…”即可分享
反馈
收藏 - 刷刷题收藏
举报
刷刷题
参考答案:
举一反三

【多选题】以下关于报文窃听的说法正确的是()

A.
通常的数据传输,尤其是通过Internet的数据传输,存在时间上的延迟,更存在地理位置上的跨越,要避免数据不受窃听,基本是不可能的
B.
在共享式的以太网环境中,所有的用户都能获取其他用户所传输的报文
C.
如果网络有几部分是基于公共的网络平台,比如宽带城域网,则此网络面临严重的报文窃听威胁
D.
对付报文窃听的主要技术手段是验证技术
相关题目:
【多选题】以下关于报文窃听的说法正确的是()
A.
通常的数据传输,尤其是通过Internet的数据传输,存在时间上的延迟,更存在地理位置上的跨越,要避免数据不受窃听,基本是不可能的
B.
在共享式的以太网环境中,所有的用户都能获取其他用户所传输的报文
C.
如果网络有几部分是基于公共的网络平台,比如宽带城域网,则此网络面临严重的报文窃听威胁
D.
对付报文窃听的主要技术手段是验证技术
刷刷题-刷题-导入试题 - 刷刷题
参考解析:
题目纠错 0
发布
刷刷题-刷题-导入试题 - 刷刷题刷刷题-刷题-导入试题 - 刷刷题刷刷题-刷题-导入试题 - 刷刷题
刷刷题-刷题-导入试题 - 刷刷题
刷刷题-刷题-导入试题 - 刷刷题
刷刷题-单词鸭