- Which cyberattacks are you familiar with?
- What do you think cyberattackers do with the information they steal from other people?
- harmful /HAHRM-fuhl/
- device /dih-VAHYS/
- compromise /KOM-pruh-mahyz/
- capable /KEY-puh-buhl /
- feature /FEE-cher/
[adjective] – causing harm
The juice drink was banned because it was found to contain harmful chemicals.
[noun] – an object or machine that has been invented for a particular purpose
The most popular device is probably the mobile phone.
[verb] – to lower or weaken standards
He didn’t realize that his inattentiveness compromised his chance to close the deal.
[adjective] – able to do things effectively and skilfully, and to achieve results
She believed her father was innocent, so she hired the most capable lawyer in the country.
[noun] – a typical quality or an important part of something
Text messaging is only one of the many communication features of a mobile phone.
Following this threat, the agency advised the public to avoid using public charging stations as much as possible. They further recommend that people bring their own chargers and cables when traveling. Another sound and popular option is for them to bring portable power banks. Updating the security features of mobile devices is a sound way to counter juice jacking as well.
- What did the FBI warn the public about?
- What do cyber attackers use to spread malicious software?
- Which data can juice-jacking compromise?
- What does the FBI recommend people do to avoid using public charging stations?
- Which feature should users update to counter juice jacking?
- Have you tried using public charging stations? How was your experience?
- Would you be comfortable using public charging stations in the future after reading this article? Why or why not?
- Do you think juice jacking is a serious threat? Why or why not?
- In what ways can cyber attackers exploit users’ private information?
- What should people do to further protect themselves from juice jacking and other cyberattacks?