1. Trang chủ
  2. » Ngoại Ngữ

islcollective worksheets beginner prea1 high school reading speaking spelling writing past perfect simple tense technolo 1538931541556942da981d58 56667276

5 304 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 5
Dung lượng 561,75 KB

Nội dung

A group of Russian hackers has stolen user names, password combinations and millions of email addresses.. In December, hackers in Europe stole 40 million credit card numbers and 70 milli

Trang 1

 What do you associate the title

with?

 Do you use any technological

device? Why? Why not?

 How secure is your personal information on the Net?

Hacking has become a common topic all over

the world News on different criminal cyber

events has caught people’s attention

A group of Russian hackers has stolen user

names, password combinations and millions

of email addresses A security firm in

Milwaukee discovered significant hacks

including millions of records from Adobe

System The firm hasn’t revealed the names

of the victims which remain vulnerable

because it signed a confidentiality agreement

In December, hackers in Europe stole 40

million credit card numbers and 70 million

addresses, phone numbers and additional

pieces of personal information So far, the

criminals have not sold many of the records

online They used the stolen information to

send spam on social networks like Twitter

While credit cards can be easily canceled,

personal credentials like an email address,

Social Security or password can be used for

identity theft The New York Times AUG.

5, 2014

German authorities have arrested a

well-known cyber-criminal but the police haven’t

revealed his real name yet He stole millions

of dollars from 24 bank accounts around the

world in one night By using manipulated

credit cards, this Turkish citizen took U$$ 40

million The authorities hadn’t found him

until August this year when the US police

gave information about the criminal’s

location He had been in a hotel when he

received an e-mail that the authorities

detected thanks to the Wi-Fi service La Gaceta, August 18, 2014

One important case of hacking is the one that involves iPhones Apple has developed the application “Find my iPhone” for its users to locate their smart phones if it has been lost or stolen This application allows the user to lock the phone until it is recovered Hackers haven’t used this application to find a phone but to “kidnap” them They’ve hacked the accounts in icloud to lock the phones and they sent a message to the users requesting for money in order to unlock it If they don’t pay the rescue, they cannot use their phones again Apple´s official website has confirmed the news and advised their clients to update their personal account Recently, engineers have discovered a security failure in the system where the application can be

downloaded RedUSERS May 27, 2014

Recently, in Argentina many famous people have become involved in a scandal Camus Hacker has published some of their private

photographs in Twitter and has blackmailed

them into publishing more Noelia Marzol and Annalisa Santi have presented relevant proofs against this virtual criminal He has manipulated the celebrities’ personal computers and cell phones He has become the first and most famous hacker in Argentina The investigation has not finished yet but if the evidence shows that he is guilty

and will go to jail Clarin.com 29/01/14

WARM UP

HAVE YOU HEARD ABOUT HACKING?

READING

Trang 2

1 Read the text:

 What is the text about?

 Cyber-crime

 A new video game

 A new social networking

 Choose a suitable title for each of the paragraphs There is one extra you don’t need.

a) Famous at site!

b) Taking lives c)

d) Fast criminals e) Smart does not always mean intelligent

2 Answer the following questions

a) Which information has the Russian hackers taken?

………

b) What has happened to Adobe system?

………

c) How has the Turkish band operated?

………

d) How did the police get the Turkish criminal?

………

e) How did hackers kidnap people’s iPhones?

………

f) What has Apple recommended phone users do?

………

g) Who is Camus?

………

h) How did he get the photos?

………

3 Find in the text a word that refers to

I A person who uses computers in an illegal way

VOCABULARY

Trang 3

II A secret series of characters that help a user to access a file, computer or

programme

III A type of wireless networking in which devices do not use cables……….

IV A type of software that helps the user to perform specific tasks

V A place on the Internet where you can find information about a particular subject,

organization, etc………

VI To move information to your computer from the Internet………

4 Read the following sentences and complete the rules for the present perfect.

German authorities have arrested a cyber-criminal He has manipulated the celebrities’ personal

computers and cell phones.

Hackers haven’t used this application to find a phone The firm hasn’t revealed the names of the victims.

Affirmative Negative

1 Hackers used this application to

“kidnap” phones.

2 Apple _developed the application

“Find my iPhone”

1 The police revealed his real name.

2 The investigation _finished yet.

Choose one option to complete the rules for the present perfect

In the present perfect, we use have/has + past participle with I-You- We- They

We use have/has + past participle with She- He- It

We use the present perfect to describe an activity that is still in progress/ an activity

that has already finished

5 Use the past participle form of verbs in the box to complete the sentences Use

the present perfect form.

GRAMMAR

Trang 4

6 Imagine a situation in which you have had problems with your computer Then complete the e-mail.

Hi Diego,

I have received my new netbook from the government and I’ve had some problems I’ve received several e-mails from unknown addresses and I opened one It had a link and I clicked on it Accidentally, I have downloaded a virus because

Flor

Announce- allow – recommend- - download- infect-

The regional manager in Mexico, Melissa Correa _ _that a virus _the application “Find my iPhone” The hacking of smart phones _ cyber criminals to have access to the personal information of celebrities like Jennifer Lopez She _ those users who _ _ this App yet to follow some steps to avoid hacking: do not click on unknown links, do not connect to a public Wi-Fi service and do not use the same password in all accounts.

WRITING

Ngày đăng: 29/08/2016, 13:26

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN

w