Hijackers like this one utilize this kind of information to generate appropriate advertisements and show them in accordance with your presumed interests. Your information may be at risk because while it is on your device, this hijacker has access to information such as where you are located, the current version of your device’s operating system, what other applications you have installed, and your web browser history and preferences. There is one major issue with “Your device has been compromised”, and that is that it covertly obtains various rights on your device without asking your permission. The “Your device has been compromised” infection is not as serious as a ransomware or a Trojan Horse infection, but in some instances, it may slow down your device and result in crashes and freezing. The “Your device has been compromised” hijacker has access to information such as your web browser history and preferences.