Now can this be used to get into someone’s cell phone. I have a hacker who has taken over 4 emails and a bunch of my influencer accts. I believe she connects through my WiFi. Is any of this possible. I get reports daily in my file system and don’t know how to stop this. Someone please help
Thank you
Nancyb