句间停顿:
  • 1S
  • 3S
  • 5S
语速: x 1.0
  • 速度0.8X
  • 速度1.0X
  • 速度1.2X
  • 速度1.5X
  • 速度1.8X
  • 速度2X
始终显示原文
欢迎使用 KMF 精听精研
坚持练习精听,反复听、吃透每个句子,能够快速 提升听力能力
开始精听
或按 「 空格」开始播放

段落1

This is Scientific American 60-Second Science. I'm Christopher Intagliata. Got a minute?

点击显示原文

隐藏原文=

Now that you've changed all your passwords because of the Heartbleed Bug (right?),

点击显示原文

隐藏原文=

here's something else to worry about, your smartphone might be susceptible to one of the Web's most common hacks, something called a cross-site scripting attack.

点击显示原文

隐藏原文=

Here's how it works.

点击显示原文

隐藏原文=

Let's say you scan a 2-D bar code with your phone.

点击显示原文

隐藏原文=

The bar code contains information, including, perhaps, a string of malicious JavaScript code.

点击显示原文

隐藏原文=

If your bar code reader is a native iPhone or Android app, no problem.

点击显示原文

隐藏原文=

But if it's an HTML5 app, which works across platforms, you might be in trouble.

点击显示原文

隐藏原文=

Because HTML5 apps run on JavaScript.

点击显示原文

隐藏原文=

And some are designed to detect JavaScript in a jumble of data, like that bar code and execute it.

点击显示原文

隐藏原文=

Researchers found five bar code–scanner apps with that vulnerability in the Android marketplace and three in the iPhone app store.

点击显示原文

隐藏原文=

They'll present the results at the Mobile Security Technologies workshop in San Jose in May.

点击显示原文

隐藏原文=

HTML5 apps are forecast to dominate half the market by 2016.

点击显示原文

隐藏原文=

And since bad code can hide in mp3s, photos, texts, even the names of wi-fi networks,

点击显示原文

隐藏原文=

researchers say it's time for developers to wise-up to this glitch before it goes viral.

点击显示原文

隐藏原文=

Thanks for the minute, for Scientific American 60-Second Science. I'm Christopher Intagliata.

点击显示原文

隐藏原文=
[ < 空格 > ]
当前句 /
/
  • 段落1
  • 第 1 句
  • 第 2 句
  • 第 3 句
  • 第 4 句
  • 第 5 句
  • 第 6 句
  • 第 7 句
  • 第 8 句
  • 第 9 句
  • 第 10 句
  • 第 11 句
  • 第 12 句
  • 第 13 句
  • 第 14 句
  • 第 15 句
  • 第 16 句

+ 创建收藏夹
保存 取消