1. In this first attack, our ethical hacker encrypts all of your data, until you pay a huge ransom to get it back.
2. In this second attack, our ethical hacker uses a fake login portal to get you to give away your login details.
3. In this final attack, our hacker reveals why it’s so important to always keep your software and operating system fully-up to date.