In this video, you’ll explore how the European Union regulates data privacy through the General Data Protection Regulation (GDPR). You will learn more about: data privacy rights the main rules …
In this video, you’ll explore how social media platforms are used to spread malware and expose user information to hackers and scammers. You will learn more about how to recognise …
In this video, you’ll explore various ways users can ensure that they are signing into websites safely by effectively managing usernames and passwords. You will learn more about: how to …
In this video, you’ll explore Banking Trojan attacks and how hackers can use malicious code to access and deplete bank accounts. You will learn more about how a computer or …
In this video, you’ll explore how instant messaging services such as Skype, WhatsApp, Telegram and LinkedIn are used in cyberattacks. You’ll examine the social engineering methods used in instant messaging …