1.
Software designed to gain access to damaged software computer system
2.
when a scammer claims to represent a company online
3.
blocks access to a phone that steals money
4.
access the ability to control your devices through others people phone
5.
breach data that a company stores is exposed to a hacker.
6.
questions identifying customers when they forget a password etc.
7.
It makes it harder for a hacker to gain access to your devices.