hacked in | WeLiveSecurity

hacked in

Figure 4: Claim of having hacked the victim's computer