First page Back Continue Last page Overview Graphics
Compromise can lead to ...
Changing DNS settings – phishing/pharming
Eavesdropping on traffic - network/VOIP
Devices can be repurposed – spam, distributed denial of service
In most cases, the owner will be completely unaware that it has been compromised