While it is possible that some extremists may utilize technology for malicious purposes, the existence of a cyber pathogen cannot be assumed on any device unless there is evidence of compromise . Cybersecurity risks vary depending on an individual's activities ,security practices ,and potential exposure of a cyber pathogen on an extremist's iPhone remains context-dependent .