It’s no surprise that the act of hacking has grown increasingly sophisticated over the years. Today, there are multiple advanced forms of hacking (i.e. jailbreaking, chip and pin hacks, IoT botnets) but perhaps one of today’s most innovative forms of hacking is extortion hacking, or cyber extortion.
At the consumer-level, jailbreaking— the process of gaining root access to a mobile device’s core operating system—offers some unique benefits. For example, users can strip their device of its original manufacturer restrictions in order to install third-party applications that may be unavailable in the app store.