Digital Forensic Use Case: Hacked Device
If a hacker was able to compromise your device there are several things they may be able to do. The capabilities of the hacker is driven by the sophistication of the malware, the stability of the device’s network connection, and any security software or devices that impair or remove the malware’s ability to function.