How to protect your device from Hackers.
Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself. 1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears innocent, but is actually infected with malware. Malware can turn on your computer’s microphones and broadcast your conversations, record your screen, watch what you type on your keyboard, copy files, or even insert false records. Be very careful opening strange email attachments and double check with the person who sent it before you open it if you’re unsure. 2. A malicious weblink: It’s possible to infect a computer with malware remotely just by visiting a webpage (sometimes called a “drive-by download”). If a link prompt...