Internet security researchers say they have looked at and identified software weakness that puts millions of smart devices we use at risk of attacks and the Internet security weakness can be used to attack business or home computer networks. The report says many devices are designed for personal use and include the ability to control home cameras and temperature from a distance. Companies use similar devices in security systems, heating and cooling equipment, printers and servers.
There is no evidence that any attacks have already been carried out on the defenceless devices. However, the findings have led the officials to give a warning to the users and suggest to them that defensive measures should be taken to lessen the risks of attacks. Specifically, the officials say industrial control systems shouldn’t be accessible from the Internet and should be separated from company networks.
Awais Rashid is a computer scientist who has examined the findings. He says that the discovery shows the dangers experts often find in Internet-linked devices designed without much attention to security. He adds inattentive programming by developers appears to be the main issue in this case. Dealing with the problem is especially complex because the weaknesses are found in so-called open-source software, which is free to use and can be changed by anyone. According to Elisa, vice president of research, the fact that open-source software is not owned by anyone makes the problem difficult to solve but the problem should be tackled with an effort. This means it is up to device manufacturers to fix the weaknesses themselves and some may not have the time or money to do so.
Experts say the risks are even higher with so many people working from home during the COVID-19 pandemic. This could permit attackers to hack into home networks and use this as a pathway into company networks.
1. What is the researchers’ attitude towards the Internet security weakness?A.Tolerant. | B.Doubtful. | C.Concerned. | D.Uncaring. |
A.By giving some advice to the Internet users. |
B.By helping online users upgrade software. |
C.By linking industrial control systems to company networks. |
D.By warning Internet operators to lessen the risks of attacks. |
A.Complex and impossible. |
B.Challenging but necessary. |
C.Effortless and worthwhile. |
D.Potential but unimportant. |
A.To advocate using defensive devices. |
B.To urge us to stay away from the Internet. |
C.To separate home networks from company networks. |
D.To introduce the potential risk of smart devices. |
相似题推荐
【推荐1】Oil and gas have made Qatar (卡塔尔) the richest country in the world-rich enough to be ready to spend $200 billion for the 2022 World Cup. But has limitless wealth brought the country happiness?
“We have become urban,” says Dr Kaltham Al Ghanim a professor at Qatar University. “Our social and economic life has changed-families have become separated; consumption culture has taken over.”
From desperate poverty less than a century ago, this, after all, has become the richest nation in the world. What’s less well understood is the influence of such rapid change on Qatari society itself. You can feel the pressure in Doha, the capital city of Qatar. The city is a building site, with whole districts either under construction or being destroyed for redevelopment. The local media report that 40% of Qatari marriages now end in divorce. More than two-thirds of Qataris, adults and children, are overweight.
Qataris benefit from free education, free healthcare, job guarantees, even free water and electricity, but abundance has created its own problems.“It’s confusing for graduates to be faced with 20 job offers,” one academic at an American university campus in Qatar says.“People feel huge pressure to make the right decision.”
In a society where Qataris are outnumbered roughly seven-to-one by foreigners, long-term residents (居民) speak of a growing frustration among graduates that the most satisfying jobs go to foreigners.
The sense is deepening that, in the rush for development, something important has been lost. Qatari family life is atomising. With children almost universally being raised by nannies (保姆) from the Philippines, Nepal or Indonesia, differences in culture and opinions are widening between the generations.
The 2022 football World Cup was held in Qatar. Mariam Dahrouj, a journalism graduate, speaks of a sense of threat. “People in Qatar are afraid,” she says. “Suddenly all the world wants to see us. We are a closed community, and they want to come and bring their differences. How can we express our values?”
1. What can we learn about Qatar?A.Its capital is neat and modern. | B.It’s experiencing great changes. |
C.Most Qataris are rich and healthy. | D.Great wealth brings Qataris great happiness. |
A.They have to work with foreigners. |
B.They can hardly find an interesting job. |
C.They have difficulty in making a choice. |
D.They have become lazy because of abundance. |
A.losing meaning | B.gaining support |
C.being improved | D.becoming divided |
A.feel frightened | B.express no interest |
C.ignore the differences | D.want to adjust their values |
【推荐2】You may study English for years and still not understand a native speaker of English when you meet one. Many language learners know that native speakers say a lot of things that you can’t find in a dictionary. Well, here’s a secret for you: A lot of British people can’t understand each other either!
Across the UK, a number of regions have different dialects. There are many different accents (口音) in London, because it is not just where a person is born in the UK that decides their accent. Language and accents also change across social class and level of education. Therefore, “Multicultural London English” was created at the end of the 20th century.
Other factors are also important in the invention of new accents and ways of speaking. These include the influence of people from different countries and different age groups, too.
“Yoof culture” is an example. The word “yoof” is a slang (俚语) spelling of “youth”. Young people are creating their own language, ideas and identity. By using words that their parents don’t understand, children can talk about things that their parents might not agree with. For example, instead of saying something like “That’s good!” or “I understand”, yoof will use a single adjective like “Safe!”, or “Sorted!” Yoof would use “kind-a-thing” or “sort-a-thing” to replace “if you understand what I’m saying”. In this way, they are starting to find freedom, independence and self-expression.
As learners of English, we may wonder how well we can talk to a native speaker, but perhaps we should worry less about this. Research by the British Council shows that 94 percent of the English spoken in the world today is spoken between non-native speakers of the language. In fact, when we think about “international English”, there is no such thing as a native or non-native speaker. The UK no longer owns the English language.
1. What do we know about “Multicultural London English”?A.It was invented by Londoners in the 1900s. |
B.It is now spoken by people around the world. |
C.It’s a dialect specific to a particular social class. |
D.It’s a modern accent that crosses educational levels. |
A.A mix of many different cultures. | B.The way to simplify English spelling. |
C.Young people’s desire to express themselves. | D.Young people’s longing for more attention. |
A.Got it! | B.No way! | C.With pleasure! | D.No worries! |
A.Mastering English is next to impossible. |
B.The English language is always changing. |
C.Don’t worry if you cannot understand native speakers. |
D.It helps for a non-native speaker to talk to a native speaker. |
【推荐3】Last year, a popular restaurant released a live stream of a family dining in it, without asking their permission. After finding out what the restaurant was doing, the family showed their objection, but the restaurant ignored it and insisted that they had the right to do it. Moreover, they tried to silence the family, saying that their behavior was damaging the restaurant's image. This event has caused a debate on the violation of privacy and portrait rights by webcasts.
It doesn't bother some people when their images are unconsciously recorded by cameras and shown through live streams on different online platforms. They may even enjoy appearing on screens and cooperate with some businesses. In that way, the restaurant can have more public exposure and thus attract more customers, which is their purpose of webcasting. However, others including the family mentioned above, are against it. The family thought that their portrait rights were violated, considering no one had asked if it was okay to use the images of them. They found intolerable that their actions captured by the camera were webcast live to millions of viewers, not to mention the fact that some of them were not so decent. Thus they demanded an apology from restaurant.
People may behave in a relaxed way when eating or resting, and they don't want others to see them in this way. Thus, from a legal perspective, if businesses webcast their customers for commercial reasons, they have violated customers portrait rights.
Webcasting someone without his or her consent amounts to a violation of portrait rights, which is getting increasingly common these days as cellphone webcasting is growing in popularity for technical convenience, However, public awareness of privacy protection is still falling behind. More should be done to make sure webcasting is developing sustainably, without violating people's legal rights.
1. What is the major issue argued in the passage?A.A famous restaurant published a live stream of a family dining in it. |
B.The family showed their objection to the famous restaurant's webcast. |
C.The restaurant ignored the objection and insisted they had the right to do it. |
D.The restaurant claimed that the family was damaging the restaurant's image. |
A.Customers enjoy appearing on screens. |
B.Customers cooperate with some businesses. |
C.Customers are shown through live streams online. |
D.Customers are unconsciously recorded by cameras. |
A.Businesses webcast customers live according to their agreement. |
B.Businesses webcast customers for commercial reasons and pay them. |
C.Businesses webcast customers improper actions with their permission. |
D.Businesses webcast customers behaving in a relaxed way without informing them. |
A.Public awareness of privacy protection is increasing |
B.A famous restaurant released a live stream of a family |
C.How can people behave in a relaxed way when having a rest |
D.A debate on whether webcasts violate privacy and portrait rights |
A.Objective. |
B.Negative. |
C.Positive. |
D.Subjective. |
【推荐1】Scientists are getting a better look at the universe thanks to the new James Webb Space Telescope ( JWST)—the largest, most powerful space telescope ever built. It was sent into space on a rocket on Dec. 25, 2021 and is now located about 1. 6 million kilometres away from Earth. It moves around the sun, keeping in line with Earth.
Scientists released the first images taken by the telescope in July 2022. One of these images shows the most distant view of the universe ever seen. Other images from the JWST include Jupiter and Mars, as well as two exoplanets (planets not in our own solar system). The telescope has also captured (捕获) images of the Southern Ring Nebula, a cloud of gas surrounding a dying star, as well as the Carina Nebula, where newly forming stars can be seen.
The JWST observes only infrared light. The further away something is in the universe, the longer it takes for its light to reach us on Earth. As light travels through space, it stretches out into longer and longer wavelengths. As it gets longer, it becomes invisible to humans, and is called infrared light.
Because the JWST sees infrared light, it is able to see further away—and further back in time—than other telescopes. It also records more details of the objects it observes. Scientists hope this will help them learn more about the origins of the universe, and better understand things like black holes, or how planets and galaxies are formed.
The images the telescope sends back to Earth do not look like the photographs we see from scientists. Because the JWST records only infrared light, the images it sends back appear black to a human eye. However, they actually contain many different shades of grey that represent different wavelengths of infrared light.
Scientists working with the images use filters ( 过滤器) to separate the different wavelengths. Then they give each wavelength a different colour so it can be seen by a human eye. When all of these filtered layers (层) of colour are combined, they create the colourful pictures that scientists send out. Adding colour to the images not only makes them more interesting for people to look at. It also helps scientists see more details in the images, which will help them better understand what they are looking at.
1. According to Paragraph 3, the infrared light________.A.is the light from nearby stars |
B.cannot be seen by human eyes |
C.reaches the earth earlier than other lights |
D.travels in space with shorter wavelength |
A.The pictures sent back by JWST are beautiful. |
B.JWST goes around in the same way as the sun does. |
C.The formation of the black holes was recorded by JWST. |
D.JWST has shown the farthest view of the universe by now. |
A.How scientists use JWST to take photos. |
B.Why JWST is better than other telescopes. |
C.What scientists discovers in space with JWST. |
D.How JWST helps scientists explore the space. |
【推荐2】Blowing bubbles is fun! The best thing about bubbles is that it's easy to make your own bubble solution (溶液). You can make as much as you want and blow as many bubbles as you'd like. If you add a “secret” ingredient (配料), you’ll get bigger and stronger bubbles! Do just as follows:
Measure 6 cups of water into one container, then pour 1 cup of dish soap into the water and slowly stir it until the soap is mixed in. Try not to let bubbles form while you stir.
Measure 1 tablespoon of glycerin (甘油) or 1/4 cup of corn syrup (玉米淀粉) and add it to the container. Stir the solution until it is mixed together.
You can use the solution right away, but to make even better bubbles, put the lid on the container and let your super bubble solution sit overnight. The soap mixture on the outside of a bubble is actually made of three very thin layers: soap, water, and another layer of soap. A bubble pops when the water that is trapped between the layers of soap evaporates (蒸发). The glycerin or corn syrup mixes with the soap to make it thicker. The thicker skin of the bubbles keeps the water from evaporating as quickly, so they last longer. It also makes them stronger, so you can blow bigger bubbles.
Dip a bubble wand or straw into the mixture, slowly pull it out, wait a few seconds, and then blow. If you don't have a ready-made “bubble wand”, you can make your own by cutting off the end of the bulb of a plastic pipet. Dip the cut end in solution and blow through the narrow end. You can also make a loop out of thin wire or pipe cleaner. Just twist a round end on your wire to blow the bubbles through. You can even make it heart-shaped, square or use other shapes if you're clever enough to bend it well.
1. For what purpose is the text is written?A.To argue. | B.To advertise. |
C.To entertain. | D.To instruct. |
A.The soap. | B.The corn syrup. |
C.The water. | D.The straw. |
A.Blow bubbles. | B.Mix the solution. |
C.Measure soap. | D.Shape wires. |
A.More soap, more bubbles. |
B.Less water, better bubbles. |
C.Thicker layers, bigger bubbles. |
D.Stronger skin, bigger bubbles. |
【推荐3】If your phone needs a software upgrade, you would likely run the installations when it’s fully charged. Otherwise, your phone and its software would take longer to correspond.
A new study finds human energy systems operate in a similar fashion: Our metabolisms (新陈代谢) likely function best in the morning when our bodies are fresh and fully charged. The research, based on a seven-year dietary analysis of 50,000 adults, found that body weight, measured by Body Mass Index, corresponds with when we eat and how often we eat.
Specifically, people who eat larger breakfasts and adopt an 18-hour overnight fast, say from 1 pm to 7 am, have the lowest body weights. Those who ate more than three meals, or three meals plus snacks, had higher BMIs. Those who ate later in the day, after 6 pm, compared to having the largest meal at breakfast or lunch, had higher body weights.
What does this mean for you? Depending on your goals and health status, you may consider rearranging your meals so you consume more calories in the morning. So, let’s say you consume 1,500 to 1,800 calories a day. Instead of splitting 500 to 600 calories evenly at each meal, you could experiment with eating 600 to 700 calories for breakfast, 600 to 700 calories for lunch and a light 300- to 400-calorie dinner. If you’re looking to lose 10 pounds, the 18- to 19-hour overnight fast might work well for you. This could mean eating a larger breakfast, a medium-sized lunch and no dinner at all.
Of course, this fasting approach isn’t for everyone. People who maintain highly active lifestyles, for instance, and need adequate fuel to power morning runs or help muscle fibers recover from intense evening workouts like weightlifting might not benefit. Still, the concept provides a glimpse into how our bodies employ fuel efficiently. After all, previous research has shown that breakfast increases appetite, reduces total energy intake and sets us up to make better food choices throughout the day, likely because we start out with better breakfast options like fiber- and nutrient-dense foods.
As lead author Dr Hana Kahleova said, the ancient advice to eat breakfast like a king, lunch like a prince and dinner like a pauper has new science behind it.
1. Why phone and its software are mentioned in the first paragraph?A.To stress the importance of phone. |
B.To introduce the topic. |
C.To tell us when we should run the installation. |
D.To tell us the software should be upgraded in time. |
A.It is your weight. |
B.It has nothing to do with what you eat. |
C.It measures the health of your body. |
D.It is in agreement with the time and frequency of your eating. |
A.Exercise regularly. | B.Keep a balanced diet. |
C.Skip supper. | D.Have a larger breakfast. |
A.How to control your weight? |
B.How to make your body fully charged? |
C.Can more meals help you keep an ideal BMI? |
D.Can skipping dinner help you lose weight? |
【推荐1】Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off.
As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security.
When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off.
But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years.
Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software.
In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint.
This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action.
1. Which of the following statements is true according to the passage?A.It is secure to use your password as long as you hit the Return key. |
B.Your personal details is likely to be in danger if you spend more time on the web. |
C.Your password will be safe if you have some safeguards. |
D.Never allowing your computer to store your passwords will be safe. |
A.It will be stored in RAM. |
B.It will be copied onto hard disk. |
C.It might not be overwritten. |
D.It will disappear as soon as you hit the return key. |
A.simulating the working of a complete computer system. |
B.tagging sensitive data. |
C.passing through the system. |
D.running common software. |
A.The length of the time the information is stored is not limited. |
B.The programs can not retain the information. |
C.The security problem should be paid more attention to. |
D.Some sensitive information has been copied. |
【推荐2】We seem to find out someone broke into a big company’s databases and left with millions of credit card numbers, passwords or other valuable information. Now a new kind of worry: someone could seize control of your wireless home network and steal your information from under your nose.
That’s the possibility raised by a couple of cyber security researchers from the Catholic University of Leuven in Belgium. The problem, they say, is a weakness in the very protocol meant to make wi-fi secure. That protocol is called Wi-Fi Protected Access II, WPA2. And WPA2’s weakness could allow an attacker within physical range of your wi-fi network to make a copy of that network that they could then control. The researchers call their approach a key reinstallation attack, or KRACK.
It’s important to know that a KRACK attack remains a possibility for now. The scientists realized the threat while investigating wireless security. They’ll present this research on November 1st at the Computer and Communications Security (CCS) conference in Dallas and in December at the Black Hat Europe conference in London.
In their KRACK assumption, wireless devices would be fooled into connecting to the false network. And the attacker would be able to access all of the information that devices send and receive while connected to that network — even if that information has been coded. Android and Linux would be especially easy to attack because of how their encryption keys (密钥) are set.
One measure of protection against such an attack would be to make sure they you’ve installed the most up-to-date versions of your apps, browsers and wireless router software. Updated software is most likely to include the security patches (补丁) needed to avoid falling victim to a KRACK attack, because chances are that KRACK won’t remain simply a proof-of-concept for long.
1. How can the attacker take advantage of the WPA 2’s weakness?A.By installing a key. | B.By approaching physical range. |
C.By copying and controlling the network. | D.By controlling the Internet users. |
A.The false network contributes little to such attack. |
B.If coded, the information will be free from danger. |
C.Android is easy to attack for lack of encryption keys. |
D.All of the information might be accessible to the attacker. |
A.Purchase the best-quality apps. | B.Install the latest relevant software. |
C.Ignore the patches of the computers. | D.Keep the proof of KRACK long. |
A.Sci-Tech Front. | B.Current Affairs. |
C.Global Celebrities. | D.Financial Window. |
【推荐3】A shadowy figure sits alone in a room, his face dimly lit by a computer screen. With a grin, he types in a series of computer commands, and in the blink of an eye, someone’s bank account is drained to zero.
In today’s digital age, cyberattacks like this happen thousands of times per day. Hackers can steal money, information, or completely take control of a machine from anywhere in the world. However, not all hackers are villains.
Some hackers, called white hat or ethical hackers, are individuals who make the most of their hacking skills to identify security vulnerabilities (漏洞) in hardware, software and networks. Their job is crucial in preventing cyberattacks and safeguarding sensitive information. The term “white hat” originated from old cowboy movies, where heroes wore white hats and villains wore black ones. Like the heroes in cowboy movies, white hats seek to stop the bad guys and save the day.
White hat hackers only seek vulnerabilities legally, often working on open-source software or with authorized access to systems. Once these weak spots are identified, companies or individuals can take steps to prevent serious breaches and losses. White hat hackers use a variety of different techniques to keep the internet safe. Penetration testing, for example, allows them to mimic cyberattacks and uncover system weaknesses. Security scanning tools allow white hats to identify holes in a network’s security systems. Simulating denial-of-service attacks (DoS attacks) helps companies prepare for attacks against their websites.
Many of the world’s top white hat hackers began their journeys on the wrong side of the law. A prime example is Kevin Mitnick. This notorious hacker once held the title of “most wanted hacker” in the U. S. due to his cybercriminal activities in 1995. However, after being arrested and spending five years in jail, his life took a remarkable turn. Mitnick decided to use his hacking skills for ethical purposes, eventually establishing his own cybersecurity consulting company.
If you aspire to be a white hat hacker, start by building a strong foundation in computer and network fundamentals. Good luck, computer cowboy!
1. What does the underlined word “villains” in Paragraph 2 mean?A.evil-doers. | B.heroes. | C.attackers. | D.victims. |
A.They wear white hats in cowboy movies. |
B.They do everything to safeguard people’s information. |
C.They legally use their professional skills to help people. |
D.They find vulnerabilities for personal gain without doing harm. |
A.they obey the law |
B.they identify security weak points |
C.they take measures to stop serious losses |
D.they build their own cybersecurity consulting companies |
A.To teach us how to stay secure online. |
B.To tell us how to be top white hackers. |
C.To warn us of the dangers of cyberattacks. |
D.To introduce defenders of the digital world. |