Learn How to Identify
Emails and other fraudulent contacts
Emails are often used as a gateway for a hacker to access your computer. There are also other ways to get your personal data: by telephone or by SMS. Learn what to do.