Advances in technology have brought many helpful tools to smooth the tasks of daily life, but with these advances have come apparent new vulnerabilities. The apps and types of devices many of us rely on are consistently being probed to determine and exploit these vulnerabilities.
Log in to read this article
Not a subscriber to JSH-Online? Subscribe today and receive online access to The Christian Science Journal, Sentinel, and Herald including digital editions of the print periodicals, Web original articles, blogs, and podcasts, over 30,000 minutes of Sentinel Radio and audio chats, searchable archive going back to 1883! Learn More.