INFOGRAFICS
[vc_row css=”.vc_custom_1540899342334{background-color: #eaeaea !important;}”][vc_column][vc_column_text]
THE MOTIVATIONS OF THE HACKERS
[/vc_column_text][vc_separator color=”white” border_width=”5″][vc_column_text css=”.vc_custom_1561045575250{background-color: #eaeaea !important;}”]
THE SHOPPING LIST OF HACKERS
[/vc_column_text][vc_single_image image=”7377″ img_size=”full” alignment=”center”][/vc_column][/vc_row][vc_row css=”.vc_custom_1540901719478{background-color: #eaeaea !important;}”][vc_column css=”.vc_custom_1540900654685{background-color: #e5e5e5 !important;}”][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901802188{background-color: #dbdbdb !important;}”][vc_column_text]
THE SOCIAL NETWORKS, CRADDLE OF CYBERBULLYING
[/vc_column_text][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901811957{background-color: #dbdbdb !important;}”][vc_column_text css=”.vc_custom_1540901731239{background-color: #eaeaea !important;}”]
FEW STATISTICS ABOUT WEBCAM HACKING
[/vc_column_text][vc_separator color=”white” border_width=”5″ css=”.vc_custom_1540901827388{background-color: #dbdbdb !important;}”][vc_column_text css=”.vc_custom_1540901742343{background-color: #eaeaea !important;}”]
THE GOOD BEHAVIORS TO NOT BE HACKED
[/vc_column_text][/vc_column][/vc_row]