INFOGRAFICS

[vc_row css=”.vc_custom_1540899342334{background-color: #eaeaea !important;}”][vc_column][vc_column_text]

THE MOTIVATIONS OF THE HACKERS

[/vc_column_text][vc_separator color=”white” border_width=”5″][vc_column_text css=”.vc_custom_1561045575250{background-color: #eaeaea !important;}”]

THE SHOPPING LIST OF HACKERS

[/vc_column_text][vc_single_image image=”7377″ img_size=”full” alignment=”center”][/vc_column][/vc_row][vc_row css=”.vc_custom_1540901719478{background-color: #eaeaea !important;}”][vc_column css=”.vc_custom_1540900654685{background-color: #e5e5e5 !important;}”][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901802188{background-color: #dbdbdb !important;}”][vc_column_text]

THE SOCIAL NETWORKS, CRADDLE OF CYBERBULLYING

[/vc_column_text][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901811957{background-color: #dbdbdb !important;}”][vc_column_text css=”.vc_custom_1540901731239{background-color: #eaeaea !important;}”]

FEW STATISTICS ABOUT WEBCAM HACKING

[/vc_column_text][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901827388{background-color: #dbdbdb !important;}”][vc_column_text css=”.vc_custom_1540901742343{background-color: #eaeaea !important;}”]

THE GOOD BEHAVIORS TO NOT BE HACKED

[/vc_column_text][/vc_column][/vc_row]