InterviewSolution
| 1. |
How Do Hackers And Predators Find Me? |
|
Answer» ANYONE who uses a computer connected to the INTERNET is susceptible to the threats hackers and predators pose. Hackers typically use phishing scams, spam email or instant messages and bogus Web sites to DELIVER spyware to your computer and compromise your computer security. Predators monitor your CHAT room CONVERSATIONS or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse. Anyone who uses a computer connected to the Internet is susceptible to the threats hackers and predators pose. Hackers typically use phishing scams, spam email or instant messages and bogus Web sites to deliver spyware to your computer and compromise your computer security. Predators monitor your chat room conversations or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse. |
|