Welcome to part 2 of my series on hacking. This entry will be about identifying how a hacker can put his grubby hands on your personal information and tips to protect yourself from them when it is possible.
There is 2 types of ways a hacker can gather information, one of them rely on hacking websites and servers that users don’t have access to, but use by browsing the web. The other one is accomplished by accessing the users’s inputs. It is much easier to protect yourself if you have control over some aspect of this equation. Read More Holy Shit, My Favorite Site Got Hacked! part 2