- Computer Hacking
- Phone Devices
- Legal
- Tablet
- Computer Vulnerabilities
- Users Affected
- Private Data / PII / Information
- Software Applications
- Information and Communications Technology (ICT)
- Operating Systems (OSes)
- Edge
- Servers
- Software Vulnerabilities
- Hijacking / Spoofing Attack
- Android