There are as followings:-
1. Broadband connectivity
2. Wi-fi networking
3. Removable media
4. The Web
5. E-mail and instant messaging
6. Unified communications
7. Peer-to-Peer (P2P) programs
8. E-commerce and online banking
9. Mobile computing
10. Universal connectivity
Thanks to Bill Detwiler for his “10 technologies that cybercriminals love to exploit“
You must be logged in to post a comment.