The Reading / Listening - Level 3

Fraudsters are using a new method to trick people into parting with their money. They are pretending to be technical support teams of people's ISP (Internet Service Provider). The new scam is very realistic and can trick even experienced Internet users. The fraudsters are targeting the IP (Internet Protocol) of computers – this is a particular computer's online ID number. Once they have the IP, the victim gets a pop-up window with a message that says the ISP has "detected malware" on the computer. The victim is then advised to call a phone number for help. The Internet security company Malwarebytes said: "The scammers are trying to get people to call them. People are literally paying to be scammed."



Malwarebytes said most of the scams so far have been detected in the USA and UK, but they will spread worldwide. Jerome Segura, a malware expert at Malwarebytes, told the BBC: "It caught me by surprise and I almost thought that it was real. It was a page from my ISP telling me my computer was infected. It was only when I looked in closer detail that I saw it was a scam." The fraudsters are infecting online adverts. Once an infected ad appears on your screen, the virus works out your IP number. You do not even need to click on the ad for the virus to do this. Malwarebytes' advice is to call the tech support number you received when you signed up for the Internet, and to not trust numbers in pop-up windows.

Try the same news story at these easier levels:

    Level 0 Level 1   or  Level 2

Sources
  • http://www.techradar.com/news/internet/watch-out-for-these-sophisticated-new-fake-tech-support-stings-1323769
  • http://www.bbc.co.uk/news/technology-36084989


Make sure you try all of the online activities for this reading and listening - There are dictations, multiple choice, drag and drop activities, crosswords, hangman, flash cards, matching activities and a whole lot more. Please enjoy :-)



Warm-ups

1. TECH SUPPORT: Students walk around the class and talk to other students about tech support. Change partners often and share your findings.

2. CHAT: In pairs / groups, talk about these topics or words from the article. What will the article say about them? What can you say about these words and your life?

       fraudsters / a new method / technical / experienced / message / malware / scam /
       detected / worldwide / computer / infected / detail / virus / tech support / pop-up

Have a chat about the topics you liked. Change topics and partners frequently.

3. DANGEROUS: Students A strongly believe being online is dangerous; Students B strongly believe it isn't.  Change partners again and talk about your conversations.

4. ONLINE DANGERS: What are the dangers of being online and how can we keep safe? Talk about this with your partner(s). Change partners often and share what you wrote.

  • Phishing
  • Stalkers
  • Cyber-bullying
  • Identity theft
  • Malware
  • Credit card theft
MY e-BOOK
See a sample

5. TRICK: Spend one minute writing down all of the different words you associate with the word "trick". Share your words with your partner(s) and talk about them. Together, put the words into different categories.

6. COMPUTER HATES: Rank these with your partner. Put the things you most hate at the top. Change partners often and share your rankings.

  • Having no wi-fi
  • Spam mail
  • Slow downloads
  • Sites asking you to login
  • Pop-up windows
  • Frozen screen
  • Lost data
  • Ads on websites

Before reading / listening

1. TRUE / FALSE: Read the headline. Guess if a-h below are true (T) or false (F).

  1. Fraudsters are using an old method to trick people out of their money.    T / F
  2. The scam cannot trick experienced Internet users.     T / F
  3. Victims are asked to call a phone number in a pop-up window.     T / F
  4. The article says people are trying to get the scammers to call them.     T / F
  5. Most of the scams found have been in the USA and UK.     T / F
  6. A malware expert said the new scam did not surprise him.     T / F
  7. The fraudsters use online ads to try and get your IP number.     T / F
  8. The expert advised people not to trust phone numbers in pop-ups.     T / F

2. SYNONYM MATCH: Match the following synonyms from the article.

  1. method
  2. realistic
  3. detected
  4. victim
  5. literally
  6. worldwide
  7. expert
  8. call
  9. received
  10. trust
  1. target
  2. got
  3. specialist
  4. exactly
  5. globally
  6. way
  7. be sure of
  8. authentic
  9. found
  10. phone

3. PHRASE MATCH: (Sometimes more than one choice is possible.)

  1. Fraudsters are using a new method to
  2. They are
  3. the victim gets a pop-
  4. this is a particular computer's online
  5. The scammers are trying to get people
  6. most of the scams so
  7. a malware
  8. It caught me by
  9. the virus works
  10. the tech support number you received
  1. far
  2. ID number
  3. to call them
  4. surprise
  5. when you signed up
  6. trick people
  7. out your IP number
  8. pretending
  9. expert
  10. up window with a message

Gap fill

Put these words into the spaces in the paragraph below.
particular
method
malware
literally
realistic
advised
pretending
victim

Fraudsters are using a new (1) ____________ to trick people into parting with their money. They are (2) ____________ to be technical support teams of people's ISP (Internet Service Provider). The new scam is very (3) ____________ and can trick even experienced Internet users. The fraudsters are targeting the IP (Internet Protocol) of computers – this is a (4) ____________ computer's online ID number. Once they have the IP, the (5) ____________ gets a pop-up window with a message that says the ISP has "detected (6) ____________ " on the computer. The victim is then (7) ____________ to call a phone number for help. The Internet security company Malwarebytes said: "The scammers are trying to get people to call them. People are (8) ____________ paying to be scammed."

Put these words into the spaces in the paragraph below.
detail
scams
screen
infected
trust
spread
virus
expert

Malwarebytes said most of the (9) ____________ so far have been detected in the USA and UK, but they will (10) ___________ worldwide. Jerome Segura, a malware (11) ____________ at Malwarebytes, told the BBC: "It caught me by surprise and I almost thought that it was real. It was a page from my ISP telling me my computer was (12) ____________. It was only when I looked in closer (13) ____________ that I saw it was a scam." The fraudsters are infecting online adverts. Once an infected ad appears on your (14) ____________, the virus works out your IP number. You do not even need to click on the ad for the (15) ____________ to do this. Malwarebytes' advice is to call the tech support number you received when you signed up for the Internet, and to not (16) ____________ numbers in pop-up windows.

Listening — Guess the answers. Listen to check.

1)  Fraudsters are using a new method to trick people into ______ money
     a.  partying with their
     b.  part in with their
     c.  patting with their
     d.  parting with their

2)  The new scam is very realistic and can trick even experienced ______
     a.  Internet uses
     b.  Internet users
     c.  Internet usages
     d.  Internet use is

3)  a pop-up window with a message that says the ISP has "______"
     a.  detected malware
     b.  detective malware
     c.  detect it malware
     d.  detect ad malware

4)  The victim is then advised to call a phone ______
     a.  number four help
     b.  numbers for help
     c.  numbers four help
     d.  number for help

5)  The scammers are trying to get people ______
     a.  to called them
     b.  to call them
     c.  to calls them
     d.  to calling them

6) Segura, a malware expert at Malwarebytes, told the BBC: "It ______."
     a.  caught me at surprise
     b.  caught me of surprise
     c.  caught me as surprise
     d.  caught me by surprise

7)  It was only when I looked in closer detail that I ______ scam
     a.  saw that was a
     b.  saw it was a
     c.  saw this was a
     d.  saw I was a

8)  The fraudsters are infecting ______
     a.  inline adverts
     b.  offline adverts
     c.  online adverts
     d.  an line adverts

9)  Once an infected ad appears on your screen, the virus works ______ number
     a.  out your IP
     b.  in your IP
     c.  over your IP
     d.  up your IP

10) advice is to call the tech support number you received when ______
     a.  you singed down
     b.  you signed at
     c.  you singed to
     d.  you signed up

Listening — Listen and fill in the gaps

Fraudsters are using a new (1) ___________________ people into parting with their money. They are (2) ___________________ technical support teams of people's ISP (Internet Service Provider). The new scam is very realistic and (3) ___________________ experienced Internet users. The fraudsters are targeting the IP (Internet Protocol) of computers – this is a particular computer's (4) ___________________. Once they have the IP, the victim gets a pop-up window with a message that says the ISP has "detected malware" on the computer. The victim is then (5) ___________________ phone number for help. The Internet security company Malwarebytes said: "The scammers (6) ___________________ people to call them. People are literally paying to be scammed."

Malwarebytes said most of the scams (7) ___________________ detected in the USA and UK, but they will (8) ___________________. Jerome Segura, a malware expert at Malwarebytes, told the BBC: "It (9) ___________________ surprise and I almost thought that it was real. It was a page from my ISP telling me my computer was infected. It was only when I looked (10) ___________________ that I saw it was a scam." The fraudsters are infecting online adverts. Once an infected ad appears on your screen, the virus works out your IP number. You (11) ___________________ to click on the ad for the virus to do this. Malwarebytes' advice is to call the tech support number you received when you signed up for the Internet, and to (12) ___________________ in pop-up windows.

Comprehension questions

  1. Who is using a new method to trick people?
  2. Who can the new scam trick?
  3. What is the two-letter abbreviation for a computer's online ID?
  4. What does a pop-up window say has been detected?
  5. What does an expert say people are literally paying for?
  6. Where have most cases of the scam been detected so far?
  7. Who is Jerome Segura?
  8. What are the fraudsters infecting to trick people?
  9. Who did the company Malwarebytes advise people to phone?
  10. What did an expert tell us not to trust?




Multiple choice quiz

1)  Who is using a new method to trick people?
a) journalists
b) fraudsters
c) tech support
d) ISPs

2)  Who can the new scam trick?
a) fraudsters
b) tech support
c) experienced Internet users
d) scammers

3)  What is the two-letter abbreviation for a computer's online ID?
a) SP
b) IS
c) PI
d) IP

4)  What does a pop-up window say has been detected?
a) aware
b) malware
c) software
d) hardware

5)  What does an expert say people are literally paying for?
a) to be scammed
b) adverts
c) ISPs
d) phone numbers

6)  Where have most cases of the scam been detected so far?
a) the USA and UK
b) online
c) worldwide
d) on screens

7)  Who is Jerome Segura?
a) a BBC reporter
b) an ISP boss
c) a fraudster
d) a malware expert

8)  What are the fraudsters infecting to trick people?
a) numbers
b) a page
c) online adverts
d) details

9)  Who did the company Malwarebytes advise people to phone?
a) fraudsters
b) Malwarebytes
c) a friend
d) their real tech support

10)  What did an expert tell us not to trust?
a) ads
b) numbers in pop-up windows
c) the Internet
d) ISPs

Role play

Role A —Pop-up windows

You think pop-up windows is the worst thing about computers. Tell the others three reasons why. Tell them why their things aren't so bad. Also, tell the others which is the least annoying of these (and why): ads on websites, slow downloads or sites asking you to log in.

Role B —Ads on websites

You think ads on websites is the worst thing about computers. Tell the others three reasons why. Tell them why their things aren't so bad. Also, tell the others which is the least annoying of these (and why): pop-up windows, slow downloads or sites asking you to log in.

Role C —Slow downloads

You think slow downloads is the worst thing about computers. Tell the others three reasons why. Tell them why their things aren't so bad. Also, tell the others which is the least annoying of these (and why): ads on websites, pop-up windows or sites asking you to log in.

Role D —Sites asking you to log in

You think sites asking you to log in is the worst thing about computers. Tell the others three reasons why. Tell them why their things aren't so bad. Also, tell the others which is the least annoying of these (and why): ads on websites, slow downloads or pop-up windows.

After reading / listening

1. WORD SEARCH: Look in your dictionary / computer to find collocates, other meanings, information, synonyms … for the words...

'technical'

  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • and 'support'.

  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • ________________
  • • Share your findings with your partners.

    • Make questions using the words you found.

    • Ask your partner / group your questions.

    2. ARTICLE QUESTIONS: Look back at the article and write down some questions you would like to ask the class about the text.

    •Share your questions with other classmates / groups. •Ask your partner / group your questions.

    3. GAP FILL: In pairs / groups, compare your answers to this exercise. Check your answers. Talk about the words from the activity. Were they new, interesting, worth learning…?

    4. VOCABULARY: Circle any words you do not understand. In groups, pool unknown words and use dictionaries to find their meanings.

    5. TEST EACH OTHER: Look at the words below. With your partner, try to recall how they were used in the text:

    • far
    • spread
    • page
    • closer
    • click
    • trust
    • method
    • realist
    • particular
    • once
    • advised
    • literally




    Student survey

    Write five GOOD questions about this topic in the table. Do this in pairs. Each student must write the questions on his / her own paper. When you have finished, interview other students. Write down their answers.

    (Please look at page 12 of the PDF to see a photocopiable example of this activity.)

    Discussion - Tech support scams on the rise

    STUDENT A’s QUESTIONS (Do not show these to student B)

    1. What did you think when you read the headline?
    2. What springs to mind when you hear the word 'Internet'?
    3. What do you think about what you read?
    4. How worried are you about Internet security?
    5. Have you ever had computer problems?
    6. What do you do to keep your computer safe?
    7. What risks are there of being online?
    8. What do you think about pop-up windows?
    9. What should you do if your computer is infected with malware?
    10. Who is most at risk from scams like this?

    STUDENT B’s QUESTIONS (Do not show these to student A)

    1. Did you like reading this article? Why/not?
    2. What is malware?
    3. What other Internet scams do you know about?
    4. How good are your online passwords?
    5. What do you think about this scam?
    6. Could fraudsters one day make the Internet too dangerous?
    7. What do you think of online ads?
    8. How safe is your computer?
    9. What do you think of the advice given in the article?
    10. What questions would you like to ask the fraudsters?

    Discussion — Write your own questions

    STUDENT A’s QUESTIONS (Do not show these to student B)

    (a) ________________

    (b) ________________

    (c) ________________

    (d) ________________

    (e) ________________

    STUDENT B’s QUESTIONS (Do not show these to student A)

    (f) ________________

    (g) ________________

    (h) ________________

    (i) ________________

    (j) ________________





    Language — Cloze (Gap-fill)

    Fraudsters are using a new method to (1) ____ people into parting with their money. They are pretending to be technical support teams of people's ISP (Internet Service Provider). The new scam is very (2) ____ and can trick even experienced Internet users. The fraudsters are (3) ____ the IP (Internet Protocol) of computers – this is a (4) ____ computer's online ID number. Once they have the IP, the victim gets a pop-up window with a message that says the ISP has "(5) ____ malware" on the computer. The victim is then advised to call a phone number for help. The Internet security company Malwarebytes said: "The scammers are trying to get people to call them. People are literally paying to (6) ____ scammed."

    Malwarebytes said most of the scams so (7) ____ have been detected in the USA and UK, but they will spread worldwide. Jerome Segura, a malware expert at Malwarebytes, told the BBC: "It caught me (8) ____ surprise and I almost thought that it was real. It was a page from my ISP telling me my computer was infected. It was only when I looked in (9) ____ detail that I saw it was a scam." The fraudsters are infecting online adverts. Once an infected ad (10) ____ on your screen, the virus works out your IP number. You do not (11) ____ need to click on the ad for the virus to do this. Malwarebytes' advice is to call the tech support number you received when you signed up for the Internet, and to not (12) ____ numbers in pop-up windows.

    Which of these words go in the above text?

    1. (a)     tricky     (b)     trick     (c)     trickster     (d)     tricked
    2. (a)     really     (b)     realistic     (c)     realism     (d)     reality
    3. (a)     target     (b)     targets     (c)     targeted     (d)     targeting
    4. (a)     particle     (b)     particular     (c)     particularly     (d)     particulars    
    5. (a)     detective     (b)     detected     (c)     detection     (d)     defected    
    6. (a)     have     (b)     do     (c)     be     (d)     take     
    7. (a)     fur     (b)     farther     (c)     far     (d)     further    
    8. (a)     on     (b)     at     (c)     by     (d)     to     
    9. (a)     clothes     (b)     closet     (c)     closed     (d)     closer      
    10. (a)     appears     (b)     arrears     (c)     adheres     (d)     all ears      
    11. (a)     even     (b)     event     (c)     evens     (d)     evening  
    12. (a)     belief     (b)     faith     (c)     trust     (d)     rely

    Spelling

    Paragraph 1

    1. a new dohtme to trick people
    2. The new scam is very ercistlia
    3. a iurclraapt computer's online ID number
    4. the ISP has eteddtec malware
    5. Internet yrutiecs company
    6. People are tlyeallri paying to be scammed

    Paragraph 2

    1. they will epsadr worldwide
    2. a malware erxpte
    3. my computer was tidecnfe
    4. I looked in closer letadi
    5. Malwarebytes' caiedv is to call
    6. when you eidgsn up for the Internet

    Put the text back together

    (    )     Protocol) of computers – this is a particular computer's online ID number. Once they have the IP, the victim gets a pop-

    (    )     worldwide. Jerome Segura, a malware expert at Malwarebytes, told the BBC: "It caught me by

    (    )     up window with a message that says the ISP has "detected malware" on the computer. The victim is then advised to

    (    )     realistic and can trick even experienced Internet users. The fraudsters are targeting the IP (Internet

    1  )     Fraudsters are using a new method to trick people into parting with their money. They are pretending

    (    )     adverts. Once an infected ad appears on your screen, the virus works out your IP

    (    )     infected. It was only when I looked in closer detail that I saw it was a scam." The fraudsters are infecting online

    (    )     to be technical support teams of people's ISP (Internet Service Provider). The new scam is very

    (    )     support number you received when you signed up for the Internet, and to not trust numbers in pop-up windows.

    (    )     call a phone number for help. The Internet security company Malwarebytes said: "The scammers are trying to get

    (    )     Malwarebytes said most of the scams so far have been detected in the USA and UK, but they will spread

    (    )     people to call them. People are literally paying to be scammed."

    (    )     surprise and I almost thought that it was real. It was a page from my ISP telling me my computer was

    (    )     number. You do not even need to click on the ad for the virus to do this. Malwarebytes' advice is to call the tech

    Put the words in the right order

    1. to   using   trick   a   people   new   Fraudsters   method   are   .
    2. online   computer's   particular   a   is   This   number   ID   .
    3. message   window   -   up   a   The   victim   gets   a   pop   with   .
    4. number   is   to   phone   victim   advised   a   The   then   call   .
    5. to   to   The   trying   people   them   are   get   call   scammers   .
    6. have   far   so  scams   the   of  Most   USA   the   in   detected  been   .
    7. was   infected   A   page  from   my   ISP  telling   me  my   computer   .
    8. fraudsters   are   infecting   online   adverts   The   .
    9. virus   ad   click   even   You   for   on   need   do   the   the   to   not   .
    10. when  up  support   received  signed   tech   you   you  The   number   .

    Circle the correct word (20 pairs)

    Fraudsters are using a new method to tricky / trick people into parting with their money. They are pretending / pretended to be technical support teams of people's ISP (Internet Service Provider). The new scum / scam is very realistic and can trick even / ever experienced Internet users. The fraudsters are targeted / targeting the IP (Internet Protocol) of computers – this is a peculiar / particular computer's online ID number. Once they have the IP, the victim / victimise gets a pop-up window with a message that says the ISP has "detected malware" on the computer. The victim is then advice / advised to call a phone number for help. The Internet security company Malwarebytes said: "The scammers are trying to / for get people to call them. People are literally paying to / too be scammed."

    Malwarebytes said most of the scams so fair / far have been detected in the USA and UK, but they will spreading / spread worldwide. Jerome Segura, a malware expertise / expert at Malwarebytes, told the BBC: "It caught me at / by surprise and I almost thought that it was really / real. It was a page from my ISP telling me my computer was infected / infection. It was only when I looked in closer detail that I saw it was a scram / scam." The fraudsters are infecting online adverts. Twice / Once an infected ad appears / appeals on your screen, the virus works out your IP number. You do not even need to click on the ad for the virus to do this. Malwarebytes' advice is to call the tech support number you received when you signed down / up for the Internet, and to not trust numbers in pop-up windows.

    Talk about the connection between each pair of words in italics, and why the correct word is correct.

    Insert the vowels (a, e, i, o, u)

    Fr__dst_rs _r_ _s_ng _ n_w m_th_d t_ tr_ck p__pl_ _nt_ p_rt_ng w_th th__r m_n_y. Th_y _r_ pr_t_nd_ng t_ b_ t_chn_c_l s_pp_rt t__ms _f p__pl_'s _SP (_nt_rn_t S_rv_c_ Pr_v_d_r). Th_ n_w sc_m _s v_ry r__l_st_c _nd c_n tr_ck _v_n _xp_r__nc_d _nt_rn_t _s_rs. Th_ fr__dst_rs _r_ t_rg_t_ng th_ _P (_nt_rn_t Pr_t_c_l) _f c_mp_t_rs – th_s _s _ p_rt_c_l_r c_mp_t_r's _nl_n_ _D n_mb_r. _nc_ th_y h_v_ th_ _P, th_ v_ct_m g_ts _ p_p-_p w_nd_w w_th _ m_ss_g_ th_t s_ys th_ _SP h_s "d_t_ct_d m_lw_r_" _n th_ c_mp_t_r. Th_ v_ct_m _s th_n _dv_s_d t_ c_ll _ ph_n_ n_mb_r f_r h_lp. Th_ _nt_rn_t s_c_r_ty c_mp_ny M_lw_r_byt_s s__d: "Th_ sc_mm_rs _r_ try_ng t_ g_t p__pl_ t_ c_ll th_m. P__pl_ _r_ l_t_r_lly p_y_ng t_ b_ sc_mm_d."

    M_lw_r_byt_s s__d m_st _f th_ sc_ms s_ f_r h_v_ b__n d_t_ct_d _n th_ _S_ _nd _K, b_t th_y w_ll spr__d w_rldw_d_. J_r_m_ S_g_r_, _ m_lw_r_ _xp_rt _t M_lw_r_byt_s, t_ld th_ BBC: "_t c__ght m_ by s_rpr_s_ _nd _ _lm_st th__ght th_t _t w_s r__l. _t w_s _ p_g_ fr_m my _SP t_ll_ng m_ my c_mp_t_r w_s _nf_ct_d. _t w_s _nly wh_n _ l__k_d _n cl_s_r d_t__l th_t _ s_w _t w_s _ sc_m." Th_ fr__dst_rs _r_ _nf_ct_ng _nl_n_ _dv_rts. _nc_ _n _nf_ct_d _d _pp__rs _n y__r scr__n, th_ v_r_s w_rks __t y__r _P n_mb_r. Y__ d_ n_t _v_n n__d t_ cl_ck _n th_ _d f_r th_ v_r_s t_ d_ th_s. M_lw_r_byt_s' _dv_c_ _s t_ c_ll th_ t_ch s_pp_rt n_mb_r y__ r_c__v_d wh_n y__ s_gn_d _p f_r th_ _nt_rn_t, _nd t_ n_t tr_st n_mb_rs _n p_p-_p w_nd_ws.

    Punctuate the text and add capitals

    fraudsters are using a new method to trick people into parting with their money they are pretending to be technical support teams of people's isp (internet service provider) the new scam is very realistic and can trick even experienced internet users the fraudsters are targeting the ip (internet protocol) of computers – this is a particular computer's online id number once they have the ip the victim gets a pop-up window with a message that says the isp has "detected malware" on the computer the victim is then advised to call a phone number for help the internet security company malwarebytes said "the scammers are trying to get people to call them people are literally paying to be scammed"

    malwarebytes said most of the scams so far have been detected in the usa and uk but they will spread worldwide jerome segura a malware expert at malwarebytes told the bbc "it caught me by surprise and i almost thought that it was real it was a page from my isp telling me my computer was infected it was only when i looked in closer detail that i saw it was a scam" the fraudsters are infecting online adverts once an infected ad appears on your screen the virus works out your ip number you do not even need to click on the ad for the virus to do this malwarebytes' advice is to call the tech support number you received when you signed up for the internet and to not trust numbers in pop-up windows

    Put a slash (/) where the spaces are

    Fraudstersareusinganewmethodtotrickpeopleintopartingwiththeir
    money.Theyarepretendingtobetechnicalsupportteamsofpeople'sIS
    P(InternetServiceProvider).Thenewscamisveryrealisticandcantrick
    evenexperiencedInternetusers.ThefraudstersaretargetingtheIP(Int
    ernetProtocol)ofcomputers–thisisaparticularcomputer'sonlineIDn
    umber.OncetheyhavetheIP,thevictimgetsapop-upwindowwitham
    essagethatsaystheISPhas"detectedmalware"onthecomputer.Thevi
    ctimisthenadvisedtocallaphonenumberforhelp.TheInternetsecurity
    companyMalwarebytessaid:"Thescammersaretryingtogetpeopletoc
    allthem.Peopleareliterallypayingtobescammed."Malwarebytessaid
    mostofthescamssofarhavebeendetectedintheUSAandUK,buttheywi
    llspreadworldwide.JeromeSegura,amalwareexpertatMalwarebytes,
    toldtheBBC:"ItcaughtmebysurpriseandIalmostthoughtthatitwasrea
    l.ItwasapagefrommyISPtellingmemycomputerwasinfected.Itwason
    lywhenIlookedincloserdetailthatIsawitwasascam."Thefraudstersar
    einfectingonlineadverts.Onceaninfectedadappearsonyourscreen,th
    evirusworksoutyourIPnumber.Youdonotevenneedtoclickontheadfor
    thevirustodothis.Malwarebytes'adviceistocallthetechsupportnumbe
    ryoureceivedwhenyousignedupfortheInternet,andtonottrustnumbe
    rsinpop-upwindows.

    Free writing

    Write about tech support for 10 minutes. Comment on your partner’s paper.

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

     

    Academic writing

    The Internet is more dangerous than the real world. Discuss.

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

    _____________________________________________________________________________

     

    Homework

    1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word.

    2. INTERNET: Search the Internet and find out more about malware. Share what you discover with your partner(s) in the next lesson.

    3. INTERNET SECURITY: Make a poster about Internet security. Show your work to your classmates in the next lesson. Did you all have similar things?

    4. ONLINE DANGERS: Write a magazine article about online dangers. Include imaginary interviews with people who think we cane never be safe online, and with people who think we can.

    Read what you wrote to your classmates in the next lesson. Write down any new words and expressions you hear from your partner(s).

    5. WHAT HAPPENED NEXT? Write a newspaper article about the next stage in this news story. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.

    6. LETTER: Write a letter to an expert on Internet security. Ask him/her three questions about it. Give him/her three of your ideas on how we can be safe online. Read your letter to your partner(s) in your next lesson. Your partner(s) will answer your questions.

    Answers

    (Please look at page 26 of the PDF to see a photocopiable example of this activity.)

    Help Support This Web Site

    • Please consider helping Breaking News English.com

    Sean Banville's Book

    Thank You