Pre-reading questions:
I will read each question. Then, please answer them.
- Which cyberattacks are you familiar with?
- What do you think cyberattackers do with the information they steal from other people?
Vocabulary:
I will read the words, meanings, and sample sentences. Then, repeat after me.
- harmful /HAHRM-fuhl/
- device /dih-VAHYS/
- compromise /KOM-pruh-mahyz/
- capable /KEY-puh-buhl /
- feature /FEE-cher/
[adjective] – causing harm
The juice drink was banned because it was found to contain harmful chemicals.
[noun] – an object or machine that has been invented for a particular purpose
The most popular device is probably the mobile phone.
[verb] – to lower or weaken standards
He didn’t realize that his inattentiveness compromised his chance to close the deal.
[adjective] – able to do things effectively and skilfully, and to achieve results
She believed her father was innocent, so she hired the most capable lawyer in the country.
[noun] – a typical quality or an important part of something
Text messaging is only one of the many communication features of a mobile phone.
Article reading:
Please read the whole article. Then, I will check your pronunciation and intonation.
The FBI issues a public warning against the use of charging stations because of the threat they pose to the data safety and privacy of their users. According to the report, cyber attackers use USB charging kiosks in airports and malls to spread harmful software to any device connected to them. This is because USB devices can perform commands or run programs when they are plugged into a computer. If a USB kiosk is infected with harmful software, any device that is plugged into it could potentially be infected as well. This attack, known as ‘juice jacking’, compromises the users’ text messages, files, banking information, and passwords. This type of attack is possible because the same cables used for charging are also capable of transferring data from one device to another. While the warning was recent, juice jacking has been an issue since 2011, the same year the said terminology was introduced.
Following this threat, the agency advised the public to avoid using public charging stations as much as possible. They further recommend that people bring their own chargers and cables when traveling. Another sound and popular option is for them to bring portable power banks. Updating the security features of mobile devices is a sound way to counter juice jacking as well.
Following this threat, the agency advised the public to avoid using public charging stations as much as possible. They further recommend that people bring their own chargers and cables when traveling. Another sound and popular option is for them to bring portable power banks. Updating the security features of mobile devices is a sound way to counter juice jacking as well.
Comprehension questions
I will read each question. Then, please answer them based on the article.
- What did the FBI warn the public about?
- What do cyber attackers use to spread malicious software?
- Which data can juice-jacking compromise?
- What does the FBI recommend people do to avoid using public charging stations?
- Which feature should users update to counter juice jacking?
Discussion questions
I will read each question. Then, please answer them.
- Have you tried using public charging stations? How was your experience?
- Would you be comfortable using public charging stations in the future after reading this article? Why or why not?
- Do you think juice jacking is a serious threat? Why or why not?
- In what ways can cyber attackers exploit users’ private information?
- What should people do to further protect themselves from juice jacking and other cyberattacks?