An increase1
in cyber-attacks and identity theft2
make the Internet seem like a scary
place3 these days. The hacking4
of Sony Pictures led5
the news for some time. The U.S. State Department public email system was shut down6. Even7 the White House
was a target of cyber-attack. Last week, there were reports of a billion dollar
theft from European banks and secret viruses on millions of computer systems
across Russia, China, India, Iran and elsewhere8.
This raises a question9:
How can individuals protect or make it more difficult for hackers to access
their information? Here are nine tips10
that can help you protect against11
cyber-attacks:
1. Make your password12
harder to hack
Hard passwords include upper and lower case letters13, numbers and
special characters. They should be at
least14 eight characters in length15. They should also not spell out words16 easy
for hackers to find, like your pet’s name or the name of a family member.
2. Change your password regularly
A very common
mistake17 made by users is to create one hard password, but
then never change it. Remembering a long list of complicated passwords can be
difficult. But no password is unbreakable18.
Hackers are better able hack multiple accounts if those accounts all have the
same password. A password management19 service,
like Dashlane or PasswordBox, can help you keep
track of20 hard passwords. These services permit users to easily store21 and
secure their passwords.
3. Clear your browser22
history
This goes for all the devices you use in a day – your
home computer, your work computer, or your friend’s iPad. Internet browsers like23 Firefox or
Chrome keep track of where you’ve been and what you’ve done online. They keep records24 of every
site you visited. Information about what
you sent from25 or saved on your computer can be kept26 for
days or weeks. It is very easy for anyone
who sees27 that information to steal28 a detailed record of your online
activities.
4. Do not use free Wi-Fi
An increasing
number29 of public places now offer free wireless access30 to the Internet. Often, a
user does not need a password to connect to these wireless networks. These
services might be useful31,
but they’re also an easy way for hackers to access everything on your device. Unless32 you really
need it, it is best not to use it.
5. Use HTTPS
HTTPS is officially known as “hyper-text transfer
protocol secure.” It is similar to33
HTTP, which is used to enter Internet addresses. HTTPS adds an extra layer of security34
and encryption35
while online. Communications between users and sites that support HTTPS are
encrypted. The information is also authenticated. That means36 that HTTPS can determine whether or not37 a
website is real.
6. Watch38
what you click
One of the most popular and successful ways39 hackers infect your computer is
through40 a
technique called phishing. Phishing occurs when someone opens an email attachment41 that looks real42. But the
attachment is actually43
a virus that immediately infects the user’s computer. If someone sends you a
file or a website you did not ask for44,
it is best to not click on it.
7. Try not to use public computers
For many people, not using a public computer can be
difficult. Those without a computer or Internet access at home often use
Internet cafes to get online. However45,
the more46 different
people use a computer, the more
likely47 a virus has infected it.
8. Use anti-virus protection
There are many anti-virus services available48 for
users. They can offer many different types of computer protection. Some anti-virus services are even49 free. They are
a great way to have a professional help keep users one step ahead of50 hackers.
9. Be careful while using thumb drive51
Thumb drives, also known as flash drives52, are small and easy storage devices53 to
use across different computers. They are a popular device that people use to exchange54 files and
documents. They can also spread55
viruses easily across computers and networks.
Vocabulary
1.
Increase = aumento
2.
identity theft = roubo de identidades
3. seem like a scary place = parecer-se
com um lugar assustador
4. hacking
= ataque virtual
5. led
= liderou
6. was shut down = fechado (tirado do
ar)
7. Even
= até mesmo
8. Elsewhere
= em outros lugares
9. raises a question = levanta um questão
10. tips
= dicas
11. against
= contra
12. password
= senha
13. upper
and lower case letters = letras maiusculas e minusculas
14. should
be at least = deveriam ter pelo menos
15. length
= comprimento
16. spell
out words = soletrar palavras
17. common
mistake = erro comum
18. unbreakable
= inquebravel, indecifravel
19. management
= gerenciamento, admitração
20. keep track of = manter o controle de
21. easily
store = armazenar facilmente
22. browser = navegador
23. like
= como
24. records
= registros
25. what you sent from = a partir do que voce
enviou
26. can
be kept = podem ser mantidas
27. anyone who sees = qualquer um que vê
28. steal
= roubar
29. increasing
number = número crescent
30. free
wireless access = acesso wireless gratuito
31. might
be useful = podem ser uteis
32. Unless
= a menos que
33. similar to = semelhante a
34. extra
layer of security = camada extra de segurança
35. encryption
= encriptação
36. means
= significa
37. whether
or not = se ou não
38. Watch
= observe
39. successful
ways = formas bem sucedidas
40. through
= através de
41. attachment
= anexo
42. looks
real = parece real
43. actually
= na verdade
44. you
did not ask for = pelo qual voce não pediu
45. However=
contudo
46. the
more… = quanto mais…
47. the more likely = é mais provável que
48. available
= disponivel
49. even
= até mesmo
50. one
step ahead of = um passo à frente de
51. thumb
drive = pen drive
52. as
flash drives = pen drive
53. storage
devices = dispositivos de armazenamento
54. exchange
= trocar
55. spread
= espalhar