by LeoWolfert
Businessman synchronizing a mobile device with cloud storage. A black hat hacker is intercepting this connection between smart phone and the cloud by breaking the encryption of the data stream.
The license type determines how you can use this image.
![]() |
Std. | Ext. |
---|---|---|
Print / Editorial | ||
Graphic Design | ||
Web Design | ||
Social Media | ||
Edit & Modify | ||
Multi-user | ||
Resale Items | 1 | |
Unlimited Runs |