0% found this document useful (0 votes)
13 views3 pages

Writing Practice 26

The FBI warns consumers to avoid public phone charging stations to reduce the risk of exposing their devices to malware. Security experts have raised concerns about 'juice jacking,' where compromised charging ports can infect devices and access personal data. The FCC also cautions that malicious actors may leave infected cables at charging stations, highlighting the importance of using personal chargers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views3 pages

Writing Practice 26

The FBI warns consumers to avoid public phone charging stations to reduce the risk of exposing their devices to malware. Security experts have raised concerns about 'juice jacking,' where compromised charging ports can infect devices and access personal data. The FCC also cautions that malicious actors may leave infected cables at charging stations, highlighting the importance of using personal chargers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CYBERSECURITY

Too often when you are asked to paraphrase a set of sentences, the
sentences are all independent of each other. Nevertheless, in real life, that is
rarely the case. Usually what you will encounter is a passage that contains
many different sentences with some being more paraphrase-able than
others. Read the following passage and pay close attention to the ones in
RED. Your job is to paraphrase them using the words or phrases in brackets.

The FBI is warning consumers against using public phone charging stations
in order to avoid exposing their devices to malicious software (SO THAT).

 The FBI is warning consumers against using public phone


charging stations so that the risk of exposing their devices to
malicious pieces of software can be eliminated or reduced.
 A piece of advice
 He offered me useful advice.
 He offered me a lot of useful advice.
 He offered me many pieces of useful advice.
 News
 I’ve got good news and bad news.

Public USB stations like the kind found at malls and airports are being used
by bad actors to spread malware and monitoring software, according to
a tweet last week from the FBI’s Denver branch. The agency did not provide
any specific examples.

“Carry your own charger and USB cord and use an electrical outlet instead,”
the agency advised in the tweet.

While public charging stations are attractive to many when devices are
running critically low on battery, security experts have for years raised
concerns about the risk (APPEALING, VOICE). In 2011, researchers coined the
term “juice jacking” to describe the problem (FIRST).

“Just by plugging your phone into a [compromised] power strip or charger,


your device is now infected, and that compromises all your data,” Drew Paik,
formerly of security firm Authentic8, explained in an interview in 2017.

The cord you use to charge your phone is also used to send data from your
phone to other devices (TRANSFER). For instance, when you plug your
iPhone into your Mac with the charging cord, you can download photos from
your phone to your computer.

If a port is compromised, there’s no limit to what information a hacker could


take, Paik previously explained to the writer (BASICALLY ANYTHING). That
includes your email, text messages, photos and contacts.

“The FBI regularly provides reminders and public service announcements in


conjunction with our partners,” Vikki Migoya, public affairs officer at the FBI’s
Denver branch, told the writer. “This was a general reminder for the
American public to stay safe and diligent, especially while traveling.”

The Federal Communications Commission also updated a blog post on


Tuesday warning that a corrupted charging port can allow a malicious actor
to lock a device or extract personal data and passwords.

“In some cases, criminals may have intentionally left cables plugged in at
charging stations,” according to the FCC blog post (ON PURPOSE). “There
have even been reports of infected cables being given away as promotional
gifts.”

“In some cases, criminals may have intentionally left cables plugged in at
charging stations,” according to the FCC blog post (ON PURPOSE). “There
have even been reports of infected cables being given away as promotional
gifts.”

 In some cases, crimincals may have left cables plugged in at charging


stations on purpose.
 Modal verb + have + V3

 The grass looked wet in the morning. It must have rained last night.

 I haven’t seen him for 15 minutes. He may have left the party and
gone home. = He probably left the party and went home.

 Intentionally = on purpose = deliberately


 Unintentionally = by accident = accidentally = inadvertently =
mistakenly
If a port is compromised, there’s no limit to what information a hacker could
take, Paik previously explained to the writer (BASICALLY ANYTHING).

Compromise = thỏa hiệp

 The landlord will only sell the house for 1 million dollars. The buyer,
however, want him to lower the price to 0.95 million. They eventually
have to compromise to reach a deal.
Compromised = lose integrity = security

Integer = số nguyên
Integrate

 The spy is compromised.

You might also like