You are on page 1of 3

WHAT DO YOU KNOW ABOUT HACKING?

 W  Do you use any technological


Warm up h device? Why? Why not?
a  How secure is your personal
t do you associate the title with? information on the Net?

Reading

Hacking has become a common topic all over detected thanks to the Wi-Fi service. La
the world. News on different criminal cyber Gaceta, August 18, 2014
events has caught people’s attention.
One important case of hacking is the one that
A group of Russian hackers has stolen user involves iPhones. Apple has developed the
names, password combinations and millions application “Find my iPhone” for its users to
of email addresses. A security firm in locate their smart phones if it has been lost or
Milwaukee discovered significant hacks stolen. This application allows the user to
including millions of records from Adobe lock the phone until it is recovered. Hackers
System. The firm hasn’t revealed the names haven’t used this application to find a phone
of the victims which remain vulnerable but to “kidnap” them. They’ve hacked the
because it signed a confidentiality agreement. accounts in icloud to lock the phones and
In December, hackers in Europe stole 40 they sent a message to the users requesting
million credit card numbers and 70 million for money in order to unlock it. If they don’t
addresses, phone numbers and additional pay the rescue, they cannot use their phones
pieces of personal information. So far, the again. Apple´s official website has confirmed
criminals have not sold many of the records the news and advised their clients to update
online. They used the stolen information to their personal account. Recently, engineers
send spam on social networks like Twitter. have discovered a security failure in the
While credit cards can be easily canceled, system where the application can be
personal credentials like an email address, downloaded. RedUSERS May 27, 2014
Social Security or password can be used for
identity theft. The New York Times AUG. Recently, in Argentina many famous people
5, 2014 have become involved in a scandal. Camus
Hacker has published some of their private
German authorities have arrested a well- photographs in Twitter and has blackmailed
known cyber-criminal but the police haven’t them into publishing more. Noelia Marzol
revealed his real name yet. He stole millions and Annalisa Santi have presented relevant
of dollars from 24 bank accounts around the proofs against this virtual criminal. He has
world in one night. By using manipulated manipulated the celebrities’ personal
credit cards, this Turkish citizen took U$$ 40 computers and cell phones. He has become
million. The authorities hadn’t found him the first and most famous hacker in
until August this year when the US police Argentina. The investigation has not finished
gave information about the criminal’s yet but if the evidence shows that he is guilty
location. He had been in a hotel when he and will go to jail. Clarin.com 29/01/14
received an e-mail that the authorities
1. Read the text:
 What is the text about?
 Cyber-crime
 A new video game
 A new social networking

 Choose a suitable title for each of the paragraphs. There is one extra you
don’t need.
a) Famous at site!
b) Taking lives
c) .
d) Fast criminals
e) Smart does not always mean intelligent

2. Answer the following questions

a) Which information has the Russian hackers taken?


………………………………………………………………………
b) What has happened to Adobe system?
………………………………………………………………………
c) How has the Turkish band operated?
………………………………………………………………………
d) How did the police get the Turkish criminal?
………………………………………………………………………
e) How did hackers kidnap people’s iPhones?
………………………………………………………………………
f) What has Apple recommended phone users do?
………………………………………………………………………
g) Who is Camus?
………………………………………………………………………
h) How did he get the photos?
…………………………………………………………………………

Vocabulary
3. Find in the text a word that refers to
I. A person who uses computers in an illegal way...........................................
II. A secret series of characters that help a user to access a file, computer or
programme...............................
III. A type of wireless networking in which devices do not use cables…………….

IV. A type of software that helps the user to perform specific tasks..........................
V. A place on the Internet where you can find information about a particular subject,
organization, etc……………..
VI. To move information to your computer from the Internet…………………

You might also like