ADVERTISEMENT
someone attempted to access my investment account using Daniel’s laptop connected to our shared Wi-Fi.”
I smiled faintly.
“The login triggered two-factor authentication on my phone. The bank logged the device ID. My cybersecurity consultant already has the report.”
ADVERTISEMENT