by iLixe48
Compromise of the security system and threat of malicious influence or virus infection. Fix vulnerabilities. Cyber security. Counteracting hackers, viruses and internet attacks. Industrial espionage.
The license type determines how you can use this image.
![]() |
Std. | Ext. |
---|---|---|
Print / Editorial | ||
Graphic Design | ||
Web Design | ||
Social Media | ||
Edit & Modify | ||
Multi-user | ||
Resale Items | 1 | |
Unlimited Runs |