- Data Breaches
- Spying / Espionage
- Private Data / PII / Information
- Information and Communications Technology (ICT)
- Computer Hacking
- Software Applications
- Networked Devices
- Manufacturers / Manufacturing
- Spyware
- Phone Devices
- Tor
- Mobile Devices
- Software
- Information / Intelligence
- Operating Systems (OSes)