When these smartphones and laptops log on to the networks which are not real, hackers can easily steal their private information.
⇑ Translate the sentence above by Google ⇑
Related: log