Hackers target the home front Thursday February 15, 2007 The Guardian 1. One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency. 2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. Growing threat 3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working. 4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software. 5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks. 6. Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds. 7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry. 8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank." 9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. 10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware. 11. "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." Increased vigilance 12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness. 13. "This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office." Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer. 1. What do the hackers use to attack the computer system of the Royal Bank of Scotland? 2. Which word is most likely to be used by hackers to describe home computers? 3. What do the majority of people in the UK prefer? 4. How do hackers collect information so as to compose emails? 5. What do hackers obtain illegally to gain access to banks’ computer network? Questions 5-12 Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer. 6. The use of login details of VPNs by criminals does not necessarily result in any ______________. 7. Royal Bank of Scotland claimed that they are not the only victim of ______________. 8. Corporate networks will be another target of hackers with improved _______________. 9. The attacks on individuals have been greatly increased within _______________. 10. With ________________, software used by criminals can eliminate its competing programs. 11. Home users are chosen as a target because they are considered as a __________ . 12. Get Safe Online is calling for an increase in _____________ to ensure safe home working. Answers Keys: 1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.) 2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. ) 3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.) 4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.) 5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …) 6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.) 7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.) 8. 答案:techniques (見第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. ) 9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.) 10.答案:(an) antivirus system (見第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." ) 11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. ) 12. 答案:vigilance and security (見第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.") |
| 雅思考試論壇熱貼: |
【責任編輯:蘇婧 糾錯】 |
|
閱讀上一篇:2009雅思閱讀實戰訓練(十二) |
|
閱讀下一篇:2009雅思閱讀實戰訓練(十六) |
|
|
| 【育路網版權與免責聲明】 | |
| ① 凡本網注明稿件來源為"原創"的所有文字、圖片和音視頻稿件,版權均屬本網所有。任何媒體、網站或個人轉載、鏈接、轉貼或以其他方式復制發表時必須注明"稿件來源:育路網",違者本網將依法追究責任; | |
| ② 本網部分稿件來源于網絡,任何單位或個人認為育路網發布的內容可能涉嫌侵犯其合法權益,應該及時向育路網書面反饋,并提供身份證明、權屬證明及詳細侵權情況證明,育路網在收到上述法律文件后,將會盡快移除被控侵權內容。 | |
視頻課程 |
| ·2010年雅思有48個考試日 比今年新增2個 |
| ·獲廣泛認可 中國雅思考生數量破歷史紀錄 |
| ·美領館解答最新留學簽證政策 |
| ·2010年雅思考試時間表及開考城市 |
| ·英國大使館:中國雅思成績逐年提高 |
| ·河北省首個雅思考點“落戶”石家莊 |
| ·權威盤點:出國語言考試之五大最 |
| ·最新資訊:雅思將暫不在中國推行機考 |
| ·外地考生來渝“搶”雅思托?嘉 |
| ·中國學生雅思考試:應用能力成軟肋 |
| ·北京新航道學校寒假課程最新優惠 |
| ·引領考雅熱潮,開啟雅思新紀元 |
| ·明年雅思增兩考試日 全年設48個考試日期 |
| · 北京環球雅思學校雅思培訓 |
| ·雅思報名過程中重要問題的最新提示 |
| ·澳大利亞四大名校提高入學門檻 |
| ·新航道5周年真情大回饋! |
| ·南昌:IELTS考點成立并開放網上報名的通知 |
| ·美國:09年20所頂級名校錄取率盤點 |
| ·7月初ETS官方答疑解答公布 |
| ·雅思聽力考試的最大障礙:詞匯聽不懂 |
| ·從劍橋聽力看出題難點 |
| ·堅持不懈訓練雅思聽力方法 |
| ·雅思聽力備考關鍵:最后一堂課的“份量” |
| ·名師解析雅思聽力兩大誤區 |
| ·聽力考試中的數字考點 |
| ·10月24日雅思聽力考題回顧 |
| ·烤鴨必備 走近雅思聽力 |
| ·為什么聽力總是第二遍才能聽懂 |
| ·烤鴨,帶你走近雅思聽力! |
| ·雅思口語:如何克服中文思維 |
| ·應對雅思口語之各種食物的英文說法 |
| ·口語考試:小心你的肢體語言 |
| ·雅思口語Part 1中最難的10道題 |
| ·雅思口語Part 2中最難的10道題 |
| ·雅思口語Part 3中最難的10道題 |
| ·雅思口語素材:The Oriental Pearl TV Tower |
| ·雅思口語考試:不可忽略的細節 |
| ·名師教您如何從“聽”中提高雅思口語 |
| ·雅思口語中用于過渡的萬能猶豫句 |
| ·雅思閱讀考試圖形題目中必須掌握的英語單詞 |
| ·雅思閱讀考試:高中生需掌握四大技能 |
| ·突破雅思閱讀8分的捷徑 |
| ·雅思閱讀中的Matching分類和應對策略 |
| ·雅思?奸喿x文章背景知識:攝影術與藝術 |
| ·如何突破雅思閱讀高分“瓶頸” |
| ·雅思閱讀:需要會“找”會“挑” |
| ·雅思閱讀段落標題題的新趨勢及應對策略 |
| ·10月24日雅思閱讀考題回顧 |
| ·有關雅思閱讀Heading題的做題方法 |
| ·雅思寫作高分必讀:小作文句子模版總結 |
| ·寫作-考場上的"興奮劑"事件 |
| ·雅思寫作:中國學生常見問題 |
| ·雅思寫作TASK2三步走常見誤區 |
| ·雅思作文:多練才是王道 |
| ·雅思:專業運動員是否可以比其他職業賺得多 |
| ·10月24日雅思寫作(A類)考題回顧 |
| ·10月24日雅思寫作(G類)考題回顧 |
| ·2009年10月24日雅思寫作真題點評 |
| ·雅思寫作步驟指導:如何審題和列大綱 |