4.1 How do hackers get in?4.1.1 Home setup4.1.2 Corporate network4.2 Data injection attacks4.2.1 SQLi4.2.2 Cross-site scripting4.3 Malware: Viruses, Trojans, and ransomware4.3.1 Viruses4.3.2 Trojans4.3.3 Ransomware4.3.4 Protection4.4 Dodgy Wi-Fi4.4.1 Defenses4.5 Mobile phones, SMS, and 5G4.5.1 Malware4.5.2 IMEI cloning4.5.3 SMS spoofing4.5.4 Problems with 5G4.5.5 Keeping safeSummary