By no means share individual information online. Don’t share private photos or videos. Don’t trust social media friend requests from strangers.Several hackers purpose to breach defenses by exploiting either complex or social weaknesses. Technological weaknesses contain vulnerabilities in program or other exploitable weak spots. To take advantag