Lily Collins is the most dangerous celebrity for your computer

TECHi's Author Rocco Penn
Opposing Author Nbcnews Read Source Article
Last Updated
TECHi's Take
Rocco Penn
Rocco Penn
  • Words 63
  • Estimated Read 1 min

Harry Potter star Emma Watson is a has-been!

The girl we watched grow up as Hermione Granger may have a bright future as an actress and fashion icon, but her dubious distinction as “Most Dangerous Cyber Celebrity” has been usurped by the female star of the latest supernatural series to hit the big screen, “The Mortal Instruments: City of Bones” star Lily Collins.

Nbcnews

Nbcnews

  • Words 6
  • Estimated Read 1 min
Read Article

Opposing take will be shared soon.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Nbcnews

Obama wants $19 billion to improve America’s cyber security
Obama wants $19 billion to improve America’s cyber security

Cyber attacks have grown to become one of the most-important issues in the United States, with both corporations and government agencies…

Tinder now tells users where the nearest STD testing location is
Tinder now tells users where the nearest STD testing location is

Health experts have claimed for a while now that Tinder contributes to higher STD rates, and the company has finally…

LifeLock is paying a record-breaking $100 million settlement
LifeLock is paying a record-breaking $100 million settlement

Remember those LifeLock commercials where CEO Todd Davis would publicly display his own Social Security number to demonstrate the company's ability protect customers form identity…

Google has been accused of tracking students without permission
Google has been accused of tracking students without permission

Last year, Google pledged to never exploit the personal information of students for non-educational purposes, which was meant to assuage…