Complete the following summary according to the text. Put the following words on appropiate line. embedded web camera texting change personal and invasive awareness invade brakes full-fledged weaponized participation malware freeze steering High-end access badges high-voltage infected MP3 Introduction I n the future, hacks will be more (1) __________________ . The strangest hacks are introduced below. Hacks Remote-controlling a car A car ’ s (2) ____________ and (3) ____________ can be controlled through its computer. A car may be hacked over Wi-fi or with a(n) (4) ____________ , and unlocked and started just by (5) ____________ . Cyber murder Hackers can kill a person by giving the pacemaker a(n) (6) ____________ shock over wi-fi. Spy phone A phone which has been infected with (7) ____________ can be turned into a(n) (8) ____________ “ spy phone. ” When your TV watches you People may be monitored in their homes through the (9) ____________ and microphone. Hijacking a house With Internet-connected appliances and home automation systems, a hacker may (10) ___________ a home and hijack major systems and appliances. Spying on surveillance cameras (11) ___________ surveillance cameras can be hacked, letting a person (12) ____________ or (13) ____________ the picture. Cloning attacks A hacker may use a(n) _ (14) ___________ longer range radio-frequency identification reader to copy employees ’ (15) ____________ . Suggestions Your (16) ____________ and (17) ____________ will make a difference in fighting against malicious hackers.