原文已被隐藏,你可用 快捷键 - 或点击 显示原文 按钮来查看原文
第1段
1 .This is Scientific American 60-Second Science. I'm Christopher Intagliata. Got a minute?
该句暂无译文!
2 .Now that you've changed all your passwords because of the Heartbleed Bug (right?),
该句暂无译文!
3 .here's something else to worry about, your smartphone might be susceptible to one of the Web's most common hacks, something called a cross-site scripting attack.
该句暂无译文!
4 .Here's how it works.
该句暂无译文!
5 .Let's say you scan a 2-D bar code with your phone.
该句暂无译文!
6 .The bar code contains information, including, perhaps, a string of malicious JavaScript code.
该句暂无译文!
7 .If your bar code reader is a native iPhone or Android app, no problem.
该句暂无译文!
8 .But if it's an HTML5 app, which works across platforms, you might be in trouble.
该句暂无译文!
9 .Because HTML5 apps run on JavaScript.
该句暂无译文!
10 .And some are designed to detect JavaScript in a jumble of data, like that bar code and execute it.
该句暂无译文!
11 .Researchers found five bar code–scanner apps with that vulnerability in the Android marketplace and three in the iPhone app store.
该句暂无译文!
12 .They'll present the results at the Mobile Security Technologies workshop in San Jose in May.
该句暂无译文!
13 .HTML5 apps are forecast to dominate half the market by 2016.
该句暂无译文!
14 .And since bad code can hide in mp3s, photos, texts, even the names of wi-fi networks,
该句暂无译文!
15 .researchers say it's time for developers to wise-up to this glitch before it goes viral.
该句暂无译文!
16 .Thanks for the minute, for Scientific American 60-Second Science. I'm Christopher Intagliata.
该句暂无译文!