islcollective worksheets beginner prea1 high school reading speaking spelling writing past perfect simple tense technolo 1538931541556942da981d58 56667276

5 304 0
islcollective worksheets beginner prea1 high school reading speaking spelling writing past perfect simple tense technolo 1538931541556942da981d58 56667276

Đang tải... (xem toàn văn)

Thông tin tài liệu

HAVE YOU HEARD ABOUT HACKING? WARM UP • • What you associate the title with? Do you use any technological device? Why? Why not? • How secure is your personal information on the Net? READING Hacking has become a common topic all over the world News on different criminal cyber events has caught people’s attention A group of Russian hackers has stolen user names, password combinations and millions of email addresses A security firm in Milwaukee discovered significant hacks including millions of records from Adobe System The firm hasn’t revealed the names of the victims which remain vulnerable because it signed a confidentiality agreement In December, hackers in Europe stole 40 million credit card numbers and 70 million addresses, phone numbers and additional pieces of personal information So far, the criminals have not sold many of the records online They used the stolen information to send spam on social networks like Twitter While credit cards can be easily canceled, personal credentials like an email address, Social Security or password can be used for identity theft The New York Times AUG 5, 2014 German authorities have arrested a wellknown cyber-criminal but the police haven’t revealed his real name yet He stole millions of dollars from 24 bank accounts around the world in one night By using manipulated credit cards, this Turkish citizen took U$$ 40 million The authorities hadn’t found him until August this year when the US police gave information about the criminal’s location He had been in a hotel when he received an e-mail that the authorities detected thanks to the Wi-Fi service La Gaceta, August 18, 2014 One important case of hacking is the one that involves iPhones Apple has developed the application “Find my iPhone” for its users to locate their smart phones if it has been lost or stolen This application allows the user to lock the phone until it is recovered Hackers haven’t used this application to find a phone but to “kidnap” them They’ve hacked the accounts in icloud to lock the phones and they sent a message to the users requesting for money in order to unlock it If they don’t pay the rescue, they cannot use their phones again Apple´s official website has confirmed the news and advised their clients to update their personal account Recently, engineers have discovered a security failure in the system where the application can be downloaded RedUSERS May 27, 2014 Recently, in Argentina many famous people have become involved in a scandal Camus Hacker has published some of their private photographs in Twitter and has blackmailed them into publishing more Noelia Marzol and Annalisa Santi have presented relevant proofs against this virtual criminal He has manipulated the celebrities’ personal computers and cell phones He has become the first and most famous hacker in Argentina The investigation has not finished yet but if the evidence shows that he is guilty and will go to jail Clarin.com 29/01/14 Read the text:  What is the text about? • Cyber-crime • A new video game • A new social networking  Choose a suitable title for each of the paragraphs There is one extra you don’t need a) Famous at site! b) Taking lives c) d) Fast criminals e) Smart does not always mean intelligent Answer the following questions a) Which information has the Russian hackers taken? b) c) d) e) f) g) h) ……………………………………………………………………… What has happened to Adobe system? ……………………………………………………………………… How has the Turkish band operated? ……………………………………………………………………… How did the police get the Turkish criminal? ……………………………………………………………………… How did hackers kidnap people’s iPhones? ……………………………………………………………………… What has Apple recommended phone users do? ……………………………………………………………………… Who is Camus? ……………………………………………………………………… How did he get the photos? ………………………………………………………………………… VOCABULARY Find in the text a word that refers to A person who uses computers in an illegal way A secret series of characters that help a user to access a file, computer or programme A type of wireless networking in which devices not use cables…………… I II III IV V A type of software that helps the user to perform specific tasks A place on the Internet where you can find information about a particular subject, organization, etc…………… To move information to your computer from the Internet………………… VI GRAMMAR Read the following sentences and complete the rules for the present perfect German authorities have arrested a cyber-criminal He has manipulated the celebrities’ personal computers and cell phones Hackers haven’t used this application to find a phone The firm hasn’t revealed the names of the victims Affirmative Negative Hackers used this application to The police revealed his real name “kidnap” phones Apple _developed the application The investigation _finished yet “Find my iPhone” Choose one option to complete the rules for the present perfect • • • In the present perfect, we use have/has + past participle with I-You- We- They We use have/has + past participle with She- He- It We use the present perfect to describe an activity that is still in progress/ an activity that has already finished Use the past participle form of verbs in the box to complete the sentences Use the present perfect form Announce- allow – recommend- - download- infect- The regional manager in Mexico, Melissa Correa _ _that a virus _the application “Find my iPhone” The hacking of smart phones _ cyber criminals to have access to the personal information of celebrities like Jennifer Lopez She _ those users who _ _ this App yet to follow some steps to avoid hacking: not click on unknown links, not connect to a public Wi-Fi service and not use the same password in all accounts WRITING Imagine a situation in which you have had problems with your computer Then complete the e-mail Hi Diego, I have received my new netbook from the government and I’ve had some problems I’ve received several e-mails from unknown addresses and I opened one It had a link and I clicked on it Accidentally, I have downloaded a virus because Flor

Ngày đăng: 29/08/2016, 13:26

Từ khóa liên quan

Mục lục

  • Hacking has become a common topic all over the world. News on different criminal cyber events has caught people’s attention.

  • A group of Russian hackers has stolen user names, password combinations and millions of email addresses. A security firm in Milwaukee discovered significant hacks including millions of records from Adobe System. The firm hasn’t revealed the names of the victims which remain vulnerable because it signed a confidentiality agreement. In December, hackers in Europe stole 40 million credit card numbers and 70 million addresses, phone numbers and additional pieces of personal information. So far, the criminals have not sold many of the records online. They used the stolen information to send spam on social networks like Twitter. While credit cards can be easily canceled, personal credentials like an email address, Social Security or password can be used for identity theft. The New York Times AUG. 5, 2014

  • German authorities have arrested a well-known cyber-criminal but the police haven’t revealed his real name yet. He stole millions of dollars from 24 bank accounts around the world in one night. By using manipulated credit cards, this Turkish citizen took U$$ 40 million. The authorities hadn’t found him until August this year when the US police gave information about the criminal’s location. He had been in a hotel when he received an e-mail that the authorities detected thanks to the Wi-Fi service. La Gaceta, August 18, 2014

  • One important case of hacking is the one that involves iPhones. Apple has developed the application “Find my iPhone” for its users to locate their smart phones if it has been lost or stolen. This application allows the user to lock the phone until it is recovered. Hackers haven’t used this application to find a phone but to “kidnap” them. They’ve hacked the accounts in icloud to lock the phones and they sent a message to the users requesting for money in order to unlock it. If they don’t pay the rescue, they cannot use their phones again. Apple´s official website has confirmed the news and advised their clients to update their personal account. Recently, engineers have discovered a security failure in the system where the application can be downloaded. RedUSERS May 27, 2014

  • Recently, in Argentina many famous people have become involved in a scandal. Camus Hacker has published some of their private photographs in Twitter and has blackmailed them into publishing more. Noelia Marzol and Annalisa Santi have presented relevant proofs against this virtual criminal. He has manipulated the celebrities’ personal computers and cell phones. He has become the first and most famous hacker in Argentina. The investigation has not finished yet but if the evidence shows that he is guilty and will go to jail. Clarin.com 29/01/14

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan