Fotos de Stock
Editorial
Videos
Suscripciones
Contacto
Colecciones
AdobeStock
Dreamstime
Depositphotos
iStock
Shutterstock
scammers often use laptops to conduct their illegal activities, such as sending phishing emails, creating fake websites, and
Show Format Data
Format
JPG 300 DPI
Image information
Author:
dreamstime
License:
buy for Personal Use & Commercial
File Type:
JPG
Views:
times
Comprar
access
activities
advanced
attack
blackhat
blackmail
botnet
breach
buffer
computer
conduct
cracking
creating
crosssite
cyber
cybercrime
data
defender
digital
eavesdropping
emails
encrypted
engineering
espionage
ethical
exploit
extortion
fake
greyhat
hacker
hacking
hijacking
horse
identity
illegal
information
injection
intrusion
invasion
kiddie
laptops
malware
maninthemiddle
network
overflow
packet
password
persistent
personal
phishing
piracy
privacy
ransomware
rogue
saboteur
scammers
script
scripting
security
sending
sniffing
software
spearphishing
spyware
sql
stealing
theft
threat
trojan
unauthorized
use
virus
vulnerability
warfare
websites
whitehat
worm
zeroday