
Malicious attackers can take over your device—whether it's a laptop computer, a desktop PC, a smartphone or tablet—and use it to find out more about you, spy on you, or plant evidence. This animation explains a few of the ways computers get taken over (or “pwned," “0wned,” etc.), and how you can protect yourself.
1. An email attachment that contains malware: You can get tricked into running a program by clicking on an email attachment that appears...