- Share your thoughts on what you imagine to be the future of cyber attacks. Consider the types of information we store and share online today. What information will hackers try to get in the future? What approaches do you think they will use?
Nowadays, users would like to save their passwords in their own laptop, iPad, and smartphone because of too many accounts they need to log in to remember every password. Therefore, hackers will make phishing in our computer through inputting Trojan Horse.
You must log in to post a comment.