The compromised device may also contribute to the spread of the malicious software. This tactic, known as "search result ...