A group of Russian hackers has stolen user names, password combinations and millions of email addresses.. In December, hackers in Europe stole 40 million credit card numbers and 70 milli
Trang 1 What do you associate the title
with?
Do you use any technological
device? Why? Why not?
How secure is your personal information on the Net?
Hacking has become a common topic all over
the world News on different criminal cyber
events has caught people’s attention
A group of Russian hackers has stolen user
names, password combinations and millions
of email addresses A security firm in
Milwaukee discovered significant hacks
including millions of records from Adobe
System The firm hasn’t revealed the names
of the victims which remain vulnerable
because it signed a confidentiality agreement
In December, hackers in Europe stole 40
million credit card numbers and 70 million
addresses, phone numbers and additional
pieces of personal information So far, the
criminals have not sold many of the records
online They used the stolen information to
send spam on social networks like Twitter
While credit cards can be easily canceled,
personal credentials like an email address,
Social Security or password can be used for
identity theft The New York Times AUG.
5, 2014
German authorities have arrested a
well-known cyber-criminal but the police haven’t
revealed his real name yet He stole millions
of dollars from 24 bank accounts around the
world in one night By using manipulated
credit cards, this Turkish citizen took U$$ 40
million The authorities hadn’t found him
until August this year when the US police
gave information about the criminal’s
location He had been in a hotel when he
received an e-mail that the authorities
detected thanks to the Wi-Fi service La Gaceta, August 18, 2014
One important case of hacking is the one that involves iPhones Apple has developed the application “Find my iPhone” for its users to locate their smart phones if it has been lost or stolen This application allows the user to lock the phone until it is recovered Hackers haven’t used this application to find a phone but to “kidnap” them They’ve hacked the accounts in icloud to lock the phones and they sent a message to the users requesting for money in order to unlock it If they don’t pay the rescue, they cannot use their phones again Apple´s official website has confirmed the news and advised their clients to update their personal account Recently, engineers have discovered a security failure in the system where the application can be
downloaded RedUSERS May 27, 2014
Recently, in Argentina many famous people have become involved in a scandal Camus Hacker has published some of their private
photographs in Twitter and has blackmailed
them into publishing more Noelia Marzol and Annalisa Santi have presented relevant proofs against this virtual criminal He has manipulated the celebrities’ personal computers and cell phones He has become the first and most famous hacker in Argentina The investigation has not finished yet but if the evidence shows that he is guilty
and will go to jail Clarin.com 29/01/14
WARM UP
HAVE YOU HEARD ABOUT HACKING?
READING
Trang 21 Read the text:
What is the text about?
Cyber-crime
A new video game
A new social networking
Choose a suitable title for each of the paragraphs There is one extra you don’t need.
a) Famous at site!
b) Taking lives c)
d) Fast criminals e) Smart does not always mean intelligent
2 Answer the following questions
a) Which information has the Russian hackers taken?
………
b) What has happened to Adobe system?
………
c) How has the Turkish band operated?
………
d) How did the police get the Turkish criminal?
………
e) How did hackers kidnap people’s iPhones?
………
f) What has Apple recommended phone users do?
………
g) Who is Camus?
………
h) How did he get the photos?
………
3 Find in the text a word that refers to
I A person who uses computers in an illegal way
VOCABULARY
Trang 3II A secret series of characters that help a user to access a file, computer or
programme
III A type of wireless networking in which devices do not use cables……….
IV A type of software that helps the user to perform specific tasks
V A place on the Internet where you can find information about a particular subject,
organization, etc………
VI To move information to your computer from the Internet………
4 Read the following sentences and complete the rules for the present perfect.
German authorities have arrested a cyber-criminal He has manipulated the celebrities’ personal
computers and cell phones.
Hackers haven’t used this application to find a phone The firm hasn’t revealed the names of the victims.
Affirmative Negative
1 Hackers used this application to
“kidnap” phones.
2 Apple _developed the application
“Find my iPhone”
1 The police revealed his real name.
2 The investigation _finished yet.
Choose one option to complete the rules for the present perfect
In the present perfect, we use have/has + past participle with I-You- We- They
We use have/has + past participle with She- He- It
We use the present perfect to describe an activity that is still in progress/ an activity
that has already finished
5 Use the past participle form of verbs in the box to complete the sentences Use
the present perfect form.
GRAMMAR
Trang 46 Imagine a situation in which you have had problems with your computer Then complete the e-mail.
Hi Diego,
I have received my new netbook from the government and I’ve had some problems I’ve received several e-mails from unknown addresses and I opened one It had a link and I clicked on it Accidentally, I have downloaded a virus because
Flor
Announce- allow – recommend- - download- infect-
The regional manager in Mexico, Melissa Correa _ _that a virus _the application “Find my iPhone” The hacking of smart phones _ cyber criminals to have access to the personal information of celebrities like Jennifer Lopez She _ those users who _ _ this App yet to follow some steps to avoid hacking: do not click on unknown links, do not connect to a public Wi-Fi service and do not use the same password in all accounts.
WRITING