Social Media - University of Hong Kong

Such handling methods are considered as weaknesses in terms of password protection, because the memos and spreadsheets can be read by others and the phone can be stolen or compromised. Password Leakage Cases On 11th September 2014, a list of nearly 5 million Gmail addresses paired with passwords was posted online. 1 ................
................