The e-Book
 
 

1,000 IDEAS & ACTIVITIES FOR
LANGUAGE
TEACHERS

See Sample


Home
Donate
E-mail this lesson to
a student /colleague


COPYRIGHT:
Please write to
me for permission.

 

Hackers Access Millions of E-mail Accounts (5th April, 2011)

Millions of e-mail accounts have been hacked after hackers broke into a company that stores personal data. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may now get more spam. All of the companies used a database marketing service called Epsilon to handle the privacy of e-mail accounts. Management teams are now in urgent discussions to protect the privacy of their clients and keep their e-mail accounts secure.

Advertisements
 
 

Online security is becoming a worry for many of us. We think big companies will have secure systems to stop hackers accessing our private details. This incident shows that even the biggest companies cannot guarantee to keep our private information safe. Perhaps these big companies should stop trying to send us endless marketing e-mails. Our inboxes seem to be full of mails we do not want trying to sell us things we do not need. It can be very difficult to unsubscribe from them.

Advertisements
 
 

PHRASE MATCH

Match the following phrases from the article.

Paragraph 1

1.

Millions of e-mail accounts have

a.

of their clients

2

a company that stores

b.

been hacked

3.

a database marketing

c.

accounts secure

4.

now in urgent

d.

personal data

5.

protect the privacy

e.

service

6.

keep their e-mail

f.

discussions

 

Paragraph 2

1.

Online security is becoming

a.

marketing e-mails

2

secure

b.

safe

3.

keep our private information

c.

be full of mails

4.

send us endless

d.

a worry

5.

Our inboxes seem to

e.

to unsubscribe

6.

very difficult

f.

systems


LISTENING GAP FILL

Millions of e-mail accounts ____________________ after hackers broke into a company that ____________________. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may now get more spam. All of the companies ____________________ marketing service called Epsilon to ____________________ of e-mail accounts. Management teams ____________________ discussions to protect ____________________ their clients and keep their e-mail accounts secure.

Online security is ____________________ for many of us. We think big companies will have secure systems to stop hackers accessing our private details. This ____________________ even the biggest companies cannot guarantee ____________________ information safe. Perhaps these big companies should stop trying ____________________ marketing e-mails. Our inboxes ____________________ mails we do not want trying to sell us things we do not need. It can be very ____________________ from them.


MULTIPLE CHOICE

Millions of e-mail accounts have been hacked (1) ____ hackers broke into a company that stores personal (2) ____. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit card companies may (3) ____ get more spam. All of the companies used a database marketing (4) ____ called Epsilon to (5) ____ the privacy of e-mail accounts. Management teams are now in urgent discussions to protect the privacy of their clients and keep their e-mail accounts (6) ____.

Online security is becoming a (7) ____ for many of us. We think big companies will have secure systems to stop hackers accessing our private (8) ____. This incident shows that even the biggest companies cannot guarantee to (9) ____ our private information safe. Perhaps these big companies should stop trying to send us (10) ____ marketing e-mails. Our inboxes (11) ____ to be full of mails we do not want trying to sell us things we do not need. It can be very difficult to unsubscribe from (12) ____.

Put the correct words from this table into the article.

1.

(a)

after

(b)

post

(c)

later

2.

(a)

delta

(b)

beta

(c)

data

3.

(a)

now

(b)

will

(c)

real

4.

(a)

services

(b)

service

(c)

serviced

5.

(a)

handy

(b)

hands

(c)

handle

6.

(a)

security

(b)

secure

(c)

securing

7.

(a)

worries

(b)

worry

(c)

worrying

8.

(a)

petals

(b)

retails

(c)

details

9.

(a)

keep

(b)

give

(c)

do

10.

(a)

ending

(b)

endless

(c)

ends

11.

(a)

seem

(b)

are

(c)

will

12

(a)

they

(b)

us

(c)

them


SPELLING

Spell the jumbled words (from the text) correctly.

Paragraph 1

1.

iolsinlm of e-mail accounts

2.

ersopnla data

3.

e-mail ddrases

4.

used a adtaasbe

5.

in nuertg discussions

6.

keep their e-mail snuaccot secure

 

Paragraph 2

7.

ilonne security

8.

our private dseaitl

9.

gernteuaa to keep our private information

10.

send us elesnds marketing e-mails

11.

Our nesoixb seem to be full

12.

difficult to ubsicnubrse


PUT THE TEXT BACK TOGETHER

Number these lines in the correct order.

(    )

have secure systems to stop hackers accessing our private details. This incident shows that even

(    )

marketing service called Epsilon to handle the privacy of e-mail accounts. Management

1  )

Millions of e-mail accounts have been hacked after hackers broke into a company that stores personal

(    )

teams are now in urgent discussions to protect the privacy

(    )

these big companies should stop trying to send us endless marketing e-mails. Our

(    )

card companies may now get more spam. All of the companies used a database

(    )

inboxes seem to be full of mails we do not want trying to sell us things

(    )

the biggest companies cannot guarantee to keep our private information safe. Perhaps

(    )

we do not need. It can be very difficult to unsubscribe from them.

(    )

of their clients and keep their e-mail accounts secure.

(    )

Online security is becoming a worry for many of us. We think big companies will

(    )

data. People who have given their e-mail address to Hilton and Marriott Rewards, Disney and many credit


WORD JUMBLE

With a partner, put the words back into the correct order.

1.

have     e     accounts     hacked     of     mail     been     Millions     -.    

2.

companies     the     of     All     database     a     used.    

3.

privacy     accounts     of     e     Handle     -     the     mail.    

4.

teams     Management     discussions     urgent     in     now     are.    

5.

their     the     of     clients     Protect     privacy.    

6.

is   becoming   a   worry   for   many   of   us   .   Online   security

7.

Stop     accessing     private     hackers     our     details.    

8.

keep     Guarantee     information     our     to     safe     private.    

9.

Our     full     inboxes     of     seem     mails     to     be.    

10.

to     them     can     difficult     from     It     very     unsubscribe     be.    


DISCUSSION (Write your own questions)

STUDENT A’s QUESTIONS (Do not show these to student B)

1.

________________________________________________________

2.

________________________________________________________

3.

________________________________________________________

4.

________________________________________________________

5.

________________________________________________________

6.

________________________________________________________

------------------------------------------------------------------------------

STUDENT B’s QUESTIONS (Do not show these to student A)

1.

________________________________________________________

2.

________________________________________________________

3.

________________________________________________________

4.

________________________________________________________

5.

________________________________________________________

6.

________________________________________________________


WRITING

Write about hacking for 10 minutes. Show your partner your paper. Correct each other’s work.

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________

______________________________________________________________________________


HOMEWORK

1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word.

2. HACKING: Search the Internet and find more information about hacking. Talk about what you discover with your partner(s) in the next lesson.

3. MAGAZINE ARTICLE: Write a magazine article about hacking. Include an imaginary interview with a hacker. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.

4. WHAT HAPPENED NEXT? Write a newspaper article about the next stage in this news story. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.

5. LETTER: Write a letter to a hacker. Ask him/her three questions about hacking. Give him/her three of your opinions on it. Read what you wrote to your classmates in the next lesson. Your partner will answer the questions you asked.

Back to the top
 


 
 
 
 


Copyright © 2011 by Sean Banville | Privacy Policy | | Donate | Links