Listen to the audio and fill in the gaps
Cybercrimes
With the emergence of the World Wide Web, a new type of crime appeared – [ ]. However, we can state that it had existed before [ ] was invented. In books of different [ ], for example. But with the Internet, it became real.
A cyberattack is an attempt to break the [ ] system. The other word for this term is [ ]. We often imagine a [ ] as a lonely person who sits alone in the dark and tries to access different websites or [ ]. But in real life, it may be a team of the best minds [ ] and thus, detecting the most appropriate way to break the system.
The other type of cybercrime is [ ]. It is what many people do when they want to avoid [ ] for using a computer program. They usually download it from the Internet and enter a special code of the [ ] someone bought earlier. Firstly, it is [ ]. And secondly, such programs do not usually work well. For example, if it is a [ ], it may spoil the quality of the video, or the finished video may contain various computer [ ].
Cybercrimes are not as fun as they may seem to be. It is serious [ ], and it is punishable by law. Hackers may be [ ] to paying a fine or prison term for 4-7 years. Sometimes, the punishment consists of [ ].
Speaking of the most well-known cybercrimes of the XXI century, we can [ ] a few cases. One of the most famous cyberattacks was releasing a WannaCry virus. This program blocked a computer and extorted money from its owner to [ ] the system. It was the reason for a collapse in the work of banks, airports, and governmental organisations. Another famous [ ] had a male name that is popular in Russia. Petya (NotPetya or ExPetr) appeared in [ ]. It was intended to attack the largest corporate [ ] of different companies and civil services worldwide. Petya was a [ ] financial guy: it also encrypted the files and asked for payment, but in Bitcoins. After getting paid, Petya acted dishonestly: it destroyed the [ ]. The last cyber attack to be mentioned by us is the mass information leakage from Facebook in [ ]. Presumably, the data were stolen for fishing – sending SPAM emails with links that could block people's computers.