CYBERSECURITY
Too often when you are asked to paraphrase a set of sentences, the
sentences are all independent of each other. Nevertheless, in real life, that is
rarely the case. Usually what you will encounter is a passage that contains
many different sentences with some being more paraphrase-able than
others. Read the following passage and pay close attention to the ones in
RED. Your job is to paraphrase them using the words or phrases in brackets.
The FBI is warning consumers against using public phone charging stations
in order to avoid exposing their devices to malicious software (SO THAT).
The FBI is warning consumers against using public phone
charging stations so that the risk of exposing their devices to
malicious pieces of software can be eliminated or reduced.
A piece of advice
He offered me useful advice.
He offered me a lot of useful advice.
He offered me many pieces of useful advice.
News
I’ve got good news and bad news.
Public USB stations like the kind found at malls and airports are being used
by bad actors to spread malware and monitoring software, according to
a tweet last week from the FBI’s Denver branch. The agency did not provide
any specific examples.
“Carry your own charger and USB cord and use an electrical outlet instead,”
the agency advised in the tweet.
While public charging stations are attractive to many when devices are
running critically low on battery, security experts have for years raised
concerns about the risk (APPEALING, VOICE). In 2011, researchers coined the
term “juice jacking” to describe the problem (FIRST).
“Just by plugging your phone into a [compromised] power strip or charger,
your device is now infected, and that compromises all your data,” Drew Paik,
formerly of security firm Authentic8, explained in an interview in 2017.
The cord you use to charge your phone is also used to send data from your
phone to other devices (TRANSFER). For instance, when you plug your
iPhone into your Mac with the charging cord, you can download photos from
your phone to your computer.
If a port is compromised, there’s no limit to what information a hacker could
take, Paik previously explained to the writer (BASICALLY ANYTHING). That
includes your email, text messages, photos and contacts.
“The FBI regularly provides reminders and public service announcements in
conjunction with our partners,” Vikki Migoya, public affairs officer at the FBI’s
Denver branch, told the writer. “This was a general reminder for the
American public to stay safe and diligent, especially while traveling.”
The Federal Communications Commission also updated a blog post on
Tuesday warning that a corrupted charging port can allow a malicious actor
to lock a device or extract personal data and passwords.
“In some cases, criminals may have intentionally left cables plugged in at
charging stations,” according to the FCC blog post (ON PURPOSE). “There
have even been reports of infected cables being given away as promotional
gifts.”
“In some cases, criminals may have intentionally left cables plugged in at
charging stations,” according to the FCC blog post (ON PURPOSE). “There
have even been reports of infected cables being given away as promotional
gifts.”
In some cases, crimincals may have left cables plugged in at charging
stations on purpose.
Modal verb + have + V3
The grass looked wet in the morning. It must have rained last night.
I haven’t seen him for 15 minutes. He may have left the party and
gone home. = He probably left the party and went home.
Intentionally = on purpose = deliberately
Unintentionally = by accident = accidentally = inadvertently =
mistakenly
If a port is compromised, there’s no limit to what information a hacker could
take, Paik previously explained to the writer (BASICALLY ANYTHING).
Compromise = thỏa hiệp
The landlord will only sell the house for 1 million dollars. The buyer,
however, want him to lower the price to 0.95 million. They eventually
have to compromise to reach a deal.
Compromised = lose integrity = security
Integer = số nguyên
Integrate
The spy is compromised.