Hoaxes don’t attack your machine directly, but they can use as many resources as a legitimate computer virus. In this video, you’ll learn about hoaxes and resources that you can use to debunk Internet hoaxes.
<< Previous Video: ImpersonationNext Video: Whaling >>