Could a few malicious actors use everyday online tools such as Twitter and Facebook—with no hacking involved—to carry out terrorist activity?
Could a few malicious actors use everyday online tools such as Twitter and Facebook—with no hacking involved—to carry out terrorist activity?
There are currently 1 users browsing this thread. (0 members and 1 guests)