We seem to find out someone broke into a big company’s databases and left with millions of credit card numbers, passwords or other valuable information. Now a new kind of worry: someone could seize control of your wireless home network and steal your information from under your nose.
That’s the possibility raised by a couple of cyber security researchers from the Catholic University of Leuven in Belgium. The problem, they say, is a weakness in the very protocol meant to make wi-fi secure. That protocol is called Wi-Fi Protected Access II, WPA2. And WPA2’s weakness could allow an attacker within physical range of your wi-fi network to make a copy of that network that they could then control. The researchers call their approach a key reinstallation attack, or KRACK.
It’s important to know that a KRACK attack remains a possibility for now. The scientists realized the threat while investigating wireless security. They’ll present this research on November 1st at the Computer and Communications Security (CCS) conference in Dallas and in December at the Black Hat Europe conference in London.
In their KRACK assumption, wireless devices would be fooled into connecting to the false network. And the attacker would be able to access all of the information that devices send and receive while connected to that network — even if that information has been coded. Android and Linux would be especially easy to attack because of how their encryption keys (密钥) are set.
One measure of protection against such an attack would be to make sure they you’ve installed the most up-to-date versions of your apps, browsers and wireless router software. Updated software is most likely to include the security patches (补丁) needed to avoid falling victim to a KRACK attack, because chances are that KRACK won’t remain simply a proof-of-concept for long.
1. How can the attacker take advantage of the WPA 2’s weakness?A.By installing a key. | B.By approaching physical range. |
C.By copying and controlling the network. | D.By controlling the Internet users. |
A.The false network contributes little to such attack. |
B.If coded, the information will be free from danger. |
C.Android is easy to attack for lack of encryption keys. |
D.All of the information might be accessible to the attacker. |
A.Purchase the best-quality apps. | B.Install the latest relevant software. |
C.Ignore the patches of the computers. | D.Keep the proof of KRACK long. |
A.Sci-Tech Front. | B.Current Affairs. |
C.Global Celebrities. | D.Financial Window. |
相似题推荐
【推荐1】The streets of London are infamously colorful, and even more so now that some local authorities have decided to dress up pedestrian crossings in colors or other equally bright designs. Some of these “colorful crossings” are created by councils around the UK with more than just aesthetics (美学) in mind, focusing instead on preventing pedestrian casualties (伤亡人员).
Two cities in England that have just finished a pilot experiment are Liverpool and Hull. Before the experiment, the former had 99 adult pedestrian deaths or serious injuries per 100,000 people in 2019, making it the worst place in the UK that year, while in Hull 44 pedestrian casualties per 100,000 people were recorded.
“We call these colorful crossings a push because in an urban environment, pedestrians have a choice about where they cross the road,” says Dr. Holly Hope Smith, the consultant working on the two trials. “We’re trying to enhance a crossing that’s already there so that people are more likely to use it”
While Dr. Holy Hope Smith said that there had been little in terms of international research into colorful crossings, in 2004, research from Australian academics concluded that colored surfaces of crossings had a positive effect on pedestrian safety with regard to the number of crashes and the severity of injuries suffered by pedestrians. They recommended that they be applied in “busy” and “complex” pedestrian environments. More recently, a 2017 report by Better Bankside about artwork employed at crossings in London’s Southwark Street said, “Our work did make respondents use the crossing more, and 68% told us that the artwork made them experience more pleasure.”
Yet, bright colors aren’t for everyone. People suffering from autism (自闭症) have raised concerns over the nature of having several colors on a road, while guide dog owners have reported their assistance dogs being confused by the new road designs. “Colorful crossings can be really misleading for people with low vision and their guide dogs,” says Dr. Amy Kavanagh, a blind activist and campaigner. But Hope Smith doesn’t agree. “These crossings are placed to enhance existing pedestrian crossings. All the signals that are there for visually disadvantaged road users remain — the touch sensors, the audio signal for when the crossing is on — we haven’t touched them,” he says.
1. What do the figures in paragraph 2 show?A.Liverpool and Hull should try to improve their traffic system. |
B.The populations of Liverpool and Hull had a significant decline. |
C.Pedestrians in Liverpool and Hull suffered from road accidents. |
D.The experiment in Liverpool and Hull was limited by many factors. |
A.To comfort people suffering from autism. |
B.To offer pedestrians more traveling choices. |
C.To arouse people’s traffic safety awareness. |
D.To encourage people to use crossings more. |
A.They have met with conflicting opinions. |
B.They have been supported by dog owners. |
C.They need to be improved further by designers. |
D.They have effectively reduced pedestrian casualties. |
A.Can colorful crossings give us more pleasure? |
B.Will colorful crossings make our streets safer? |
C.Why are colorful crossings used around the UK? |
D.How can colorful crossings influence pedestrians? |
【推荐2】“Did you hear what happened to Adam last Friday?” Lindsey whispers to Tori.
With her eyes shining,Tori brags,“You bet I did,Sean told me two days ago. ”
Who are Lindsey and Tori talking about?It just happened to be yours truly,Adam Freedman. I can tell you that what they are saying is(a)not nice and(b)not even true. Still,Lindsey and Tori aren't very different from most students here at Linton High School,including me. Many of our conversations are gossip(闲话). I have noticed three effects of gossip:it can hurt people,it can give gossipers a strange kind of satisfaction,and it can cause social pressures in a group.
An important negative effect of gossip is that it can hurt the person being talked about. Usually,gossip spreads information about a topic—breakups,trouble at home,even dropping out–that a person would rather keep secret. The more embarrassing or shameful the secret is,the juicier the gossip it makes. Probably the worst type of gossip is the absolute lie. People often think of gossipers as harmless,but cruel lies can cause pain.
If we know that gossip can be harmful,then why do so many of us do it?The answer lies in another effect of gossip:the satisfaction it gives us. Sharing the latest rumor(传言)can make a person feel important because he or she knows something that others don't. Similarly,hearing the latest rumor can make a person feel like part of the “in group”. In other words,gossip is satisfying because it gives people a sense of belonging or even superiority(优越感 ).
Gossip also can have a third effect:it strengthens unwritten,unspoken rules about how people should act. Professor David Wilson explains that gossip is important in policing behaviors in a group. Translated into high school terms,this means that if everybody you hang around with is laughing at what John wore or what Jane said,then you can bet that wearing or saying something similar will get you the same kind of negative attention. The dos and don'ts conveyed through gossip will never show up in any student handbook.
The effects of gossip vary depending on the situation. The next time you feel the urge to spread the latest news,think about why you want to gossip and what effects your “juicy story” might have.
1. Why is a conversation given at the beginning of the passage?A.To introduce a topic. | B.To present an argument. |
C.To tell a story. | D.To clarify the writing purpose. |
A.Breaking up relationships. | B.Embarrassing the listener. |
C.Spreading information around. | D.Causing unpleasant experiences. |
A.It gives them a feeling of pleasure. | B.It helps them make more friends. |
C.It makes them better at telling stories. | D.It enables them to meet important people |
A.provide students with written rules |
B.make people watch their own behaviors |
C.force school to improve student handbooks |
D.attract the police's attention to group behaviors |
【推荐3】More than a billion people around the world have smartphones, almost all of which come with avigation (导航) apps such as Google or Apple Maps. This raises the questions we meet with any technology: What skills are we losing? What abilities are we gaining?
Talking with people who're good at finding their way around or using paper maps, I often hear lots of frustration with digital maps. North/South direction gets messed up, and you can see only a small section at a time.
But consider what digital navigation aids have meant for someone like me. Despite being a frequent traveler, I'm so terrible at finding my way that I still use Google Maps every day in the small town where I have lived for many years. What looks like an imperfect product to some has been a significant expansion of my own abilities.
Part of the problem is that reading paper maps requires specific skills. There is nothing natural about them. In many developed nations, including the U. S., one expects street names and house numbers to be meaningful references, and instructions such as "go north for three blocks and then west" make sense. In Istanbul, in contrast, where I grew up, none of those hold true. For one thing, the locals rarely use street names. Why bother when a government or a military group might change them again? Besides, the city is full of winding, ancient alleys that meet newer avenues at many angles. Instructions as simple as “go north" would require a helicopter or a bulldozer (推土机).
Let's come back to my original questions. While we often lose some skills after leaving the work to technology, it may also allow us to expand our abilities. Consider the calculator: I don't doubt that our arithmetic skills might have dropped a bit as the little machines became common, but calculations that were once boring and tricky are now much more straightforward and one can certainly do more complex calculations more confidently.
1. What is the drawback of digital maps?A.They aren't connected to smartphones. |
B.They cost too much to download. |
C.They leave some users frustrated. |
D.They mix up the south and the north. |
A.Doubtful | B.Supportive |
C.ambiguous | D.Uncaring. |
A.The differences between Istanbul and the U. S. |
B.The miserable life of people in Istanbul. |
C.The necessity of asking local people in Istanbul. |
D.The ancient alleys and new avenues in Istanbul. |
A.When technology closes a door, it opens one as well. |
B.Two paper maps are better than a digital one. |
C.Technology is not developed in a day. |
D.No calculators, no digital maps. |
Nutrition is the study of how the body takes food and uses it. This science provides information about the kinds of food a person must eat to improve and maintain good health. Such knowledge helps him develop and form people habits to his problems of healthful living. People habits of nutrition can be developed by paying attention to:(1) the variety of food included in the diet; (2) the quality of each kind of food eaten. A diet, or the food regularly eaten, must contain all the necessary factors.
Many physicians believe that overweight is one of the greatest dangers to good health. This condition often leads to a shorter life. An overweight person is also easier to suffer disease, and various disorders of the digestive system. A person’s weight directly has something to do with the amounts of food he eats.
All foods can make a person fat if too much is eaten. In reducing, the safe weight loss is about two pounds a week. The sensible way to lose weight is to decrease the gaining starchy(含淀粉的) foods, fats and sweets in the diet.
1. According to this passage, which of the following is suggested about the good health habits?
A.Good way of holding your body. | B.Balanced food. |
C.Right body weight. | D.All of the above. |
A.tiredness, boredom and weakness |
B.lack of energy |
C.careless and poor health habits |
D.overworking and illness |
A.Vegetables, meat and water only. |
B.A suitable quantity of each kind of food. |
C.Fats being part of diet. |
D.Various foods included in the diet. |
A.to lose weight you had better eat properly for daily meals |
B.the most effective way to lose weight is to have no fat and sweet |
C.even vegetables can make you put on weight, so there is no need to have fat and sweet |
D.a shorter life is a sure result of overweight |
【推荐2】There are many languages that can benefit us in many ways, from culture to trade Chinese, Russian, Arabic, French and Spanish to name but a few. Instead of teaching them directly, a better way to ensure your child can pick up all these languages is through music.
Researchers have found music training plays a key role in the development of a foreign language in its grammar, colloquialisms (口语) and vocabulary. One recent study found that when children aged nine and under were taught music for just one hour a week, they exhibited a higher ability to learn both the grammar and the pronunciation of foreign languages, compared to their classmates who had learned a different extra-curricular (课外的) activity.
Finnish children are commonly musically trained from a young age using a playful method, but they only start school at age seven and start language learning at nine or older. Despite this “late start’’ to everything apart from music skills, they commonly end up speaking three to five foreign languages. Any English-speaking person who visits Finland will find that nearly every Finnish person speaks English without any problems.
Take Ken String fellow, the American singer-songwriter, as an example of the effect of music on the ability to learn foreign languages. Many years ago, well into his thirties, he married a Frenchwoman and consequently picked up a whole new language from the beginning. People recording with him in Paris were often amazed at how he had learned it so well without any previous background, but the research explains it. As a musician who made music from childhood, he would have developed his brain’s ability for learning the grammar, semantics (语义) and pronunciation of any new language in adulthood.
1. What contributes to learning foreign languages according to the author?A.Self-teaching. | B.Home-schooling. |
C.Knowing the culture. | D.Learning music. |
A.Children’s common difficulties in foreign language learning. |
B.Children’s best age for starting music training. |
C.Children’s music training and foreign language learning. |
D.Children’s favourite extra-curricular activities. |
A.Most adults study music regularly. |
B.Most of them are gifted in music. |
C.Most of them start learning foreign languages at 7. |
D.Most adults can speak foreign languages. |
A.To prove a research finding. | B.To give practical advice. |
C.To present an argument. | D.To solve a problem. |
【推荐3】I enjoy throwing stuff away. I’d love to go full minimalism(极简主义),but my wife and two teenage kids do not share my dream of a house with almost nothing in it. I have tried. When the kids were little, I taught them my two favorite games —“Do We Need It?” and “Put It in Its Place”— and made them play every few months. Their enthusiasm never matched mine.
If I’m going to be honest, my own tidying skills are not as great as I’d like. My “discarded” pile is never quite the trash mountain I want because I make up excuses for why things are useful. I consider this unhealthy. I want to be better at moving on.
So, this time I found help — the classics for people like me: The Life-Changing Magic of Tidying Up.by Marie Kondo. Kondo’s commitment to her craft is astonishing. Her philosophy is only to keep things you love. Can I go full Kondo? I will try. One central idea is to clean by category. You start by collecting all clothes and gathering them together for consideration. It makes you rethink how you organize. Next, hold each item and ask if it brings you joy. This way you’re choosing what to keep. And that’s how I find myself with all my clothes on my bedroom floor. My wife walks by and gives me a look that says I’m nuts. She’s probably not wrong.
Somewhere near the bottom of this chaos is my special jacket. I move through the pile: pants, shirts, suits and shoes. Then my last category: jackets. I haven’t worn the thing in about 30 years. Somehow, it has survived. Now that I’m striving(力求)to follow Kondo — surely, its time has come?
I hold it in my hand. There is a tear just below the collar that widens as I hold it. It’s literally falling apart. Will I ever wear it again? Not a chance. Does it feel good to wear? Does it bring me joy? Actually, yes. At this moment, my daughter walks in. She asks about the jacket. I tell her the story. She thinks I should keep it. It’s cool and unique and full of memories. She is arguing that nostalgia(怀念)is the very reason.
I’m not entirely convinced by my daughter’s arguments. I believe in looking ahead, not backward. Nevertheless, sometimes it’s hard to let go. So I gently place the jacket on the “keep” pile.
1. What does the underlined word “discarded” probably mean in Paragraph 2?A.Adjusted | B.kept | C.abandoned | D.tidied |
A.To learn how to categorize. | B.To improve his tidying skills. |
C.To persuade his family members. | D.To develop passion for minimalism. |
A.They are curious about it. | B.They completely support it. |
C.They are strongly against it. | D.They are less passionate about it. |
A.the joy it brings him. | B.his wife’s statements. |
C.the belief in nostalgia. | D.his daughter’s indifference. |
【推荐1】Ways to protect yourself online
People often feel a sense of unknown and separation while on their computer. However, the online world exposes individuals to a wide range of possible dangers. Yet, by taking a few measures, being on the internet need not become a potential danger.
Security
Whether you get online to visit with loved ones, surf the web or complete financial transactions (业务), your computer must be secure.
Password Wisdom
The more complicated the password, the harder you make it for hackers to decode. Recommended passwords often contain upper and lower case letters along with numbers and symbols.
If shopping online or making other financial transactions, make sure the website has safety features. Safe websites typically have an “https” address and a closed padlock somewhere on the page. Still, make sure the page is safe by clicking on the padlock. There should be a security certificate displayed. Check the “issued to” pop-up window (弹窗) to ensure that the issuance (发布) matches the page.
Download Dangers
When you download a file, game or program, you are at risk for additionally getting viruses or unwanted software.
A.Select Websites Carefully |
B.Many sites have hidden programs within applications |
C.Use with caution when connecting your mobile devices at airports or in hotels |
D.If not, you are on a phishing site (钓鱼网站) that will steal personal information |
E.If possible, write your passwords down and keep them in a safe place |
F.When conducting business online done, make sure to log out of the site |
G.Make sure security updates are regularly installed (安装) and the firewall is working |
【推荐2】Research spanning several decades demonstrates that you are more likely to think the information that is repeated to be true than the information you hear only once. You usually assume that if people put in effort to repeat a statement, this reflects the truth of the statement. This tendency-also called the truth effect-is a bias (偏见) that can lead you to draw incorrect conclusions.
To what degree are people aware of the truth effect? This question was addressed in a paper in the journal Cognition early this year.
In the critical study in this paper, participants did two sessions. In one session, they read about a hypothetical (虚构的) study in which they were exposed to some statements and then were asked whether both statements they had heard before as well as these new statements were true. They were asked to predict the proportion (比例) of each statement that would be judged as true. They did this both as a prediction of other people’s performance as well as a prediction of how they would do in this study.
At another session a few days later, participants actually performed this study, reading a set of 20 statements in the hypothetical study again and then judging the truth of altogether 40 statements, half of which were from the hypothetical study and the other half of which were new.
This study did replicate the well known truth effect. People were more likely to judge statements they had seen before as true than statements that were new. Two interesting findings emerged from the prediction. First, participants tended to underestimate the size of the truth effect for everyone. T hat is, while they did expect some difference in judgments between the statements seen before and those that were new, they thought this difference would be smaller than it actually was. Second, participants more significantly underpredicted the truth effect for themselves compared to that for other people.
This study is particularly important in light of the amount of misinformation present in social media. Many people have the power to influence public opinion about important matters. Flooding social media feeds with misinformation will lead people to believe this information is true just because it is stated. Recognizing that we are all susceptible to this influence of repeated information should lead us to mistrust our intuition (直觉) about what is true and to look up important information prior to using it to make important judgments and decisions.
1. In the first paragraph, the author intends to ______.A.clarify a misconception | B.present a phenomenon |
C.challenge a statement | D.confirm a theory |
A.Impacts of the truth effect require further studies. |
B.Making predictions before judgments is significant. |
C.People have hardly any awareness of the truth effect. |
D.People tend to believe they can make wiser judgments. |
A.Critical. | B.Subject. | C.Opposed. | D.Adapted. |
Fear not: It is a lot easier than you might think to set up proper defenses. In fact, you can easily do it all in a weekend. Here’s how.
Clean Your Computer And Smartphone
Before you put new security measures into place, make sure your devices are as spotless as possible. This means installing a good antivirus program and taking the time to clear out any spy- or malware that may have already infected your system. Go with AVG Free Antivirus (free. Avg. com) or Avast! (avast. com) ---each is free. Run a full system scan. This can take over an hour, so start it before settling into other plans. When you return to your computer, clear out anything that shouldn’t be there with a few simple steps (the program will guide you). These days, it’s also worth it to make sure your phone is safe from viruses. iPhones are less likely to be targeted by spyware, but Android users should download the Lookout app (lookout. com) to scan their devices and ensure everything is as it should be.
Security Your Wi-Fi
Now that your computer is clean, you should plug any holes in your home network. It’s fairly easy for potential criminals to gain access to your information if they’re able to share your connection --- that’s why you want to be careful when using public Wi-Fi. For your home, the Federal Communications Commission recommends a few steps. Even though you put security measures into place a couple of years ago, it’s a good idea to refresh your settings. You may have to refer to the instructions for your wireless router or call tech support for help. Different routers will have different setup pages, so the actual step-by-step will vary, but the end result will be the same.
Dig Deep with Your Passwords
Everything you just accomplished could be for nothing if a thief has your existing passwords, so you need to change them for every service you use. Try it when you find yourself on those sites anyway.
What you’ve heard is true: Passwords should use a variety of special characters, numerals, letters, and cases when possible. They should be close to random, and there should be a different one for each website you use. Doing this, and keeping track of it all, is a pain --- which is why people don’t do it and wind up with stolen identities. Try Dashlane (dashlane.com), a password manager with powerful encryption (加密) that can securely keep track of the most ridiculous codes you can come up with. Best of all, it logs you into sites automatically, so there’s no need to worry about all those obscure keystrokes. Whew!
Never Answer Unwanted Email
Take are when shopping online. Always check the security symbols when using an online site for shopping. If the lock icon encryption is not there, do not give out credit details. Also, check that the site is legal --- never go to a site from a random email and start shopping online. Go to the site through a known URL or by searching for it on a search engine first.
Keep a separate credit card just for online shopping. This will make it easier to cancel if something bad does happen and your other credit card for “in real life” can still be used uninfluenced.
Don’t store information on any store’s website. It may be conventional but it’s also a possible loss to you if the site is hacked.
1. The passage is mainly about _____________.
A.ways of avoiding online identity theft |
B.tips of freeing computers from viruses |
C.measures to ensure network security |
D.steps to keep track of passwords |
A.the applications of antivirus programs |
B.the practice of using public Wi-Fi |
C.the difficult access to the passwords |
D.the separate credit card for online shopping |
A.clear out of everything in the system |
B.make a random selection of network |
C.get rid of potential spyware |
D.refresh the infected system |
A.Adopting a unique password for every website. |
B.Shopping online at reliable websites. |
C.Keeping credit details safe by checking security symbols. |
D.Monitoring credit card by storing information. |