What is Computer Hijacking?
Computer hijackers take control and damage another computer system. A computer hijack occurs when an attacker takes control of a computer system and exploits it. There are a number of ways computer hijacks can occur, most involve a Network connection or physical access to the system and vulnerability in some part of the system. Once the hacker takes control of a system, he has the capability to use it however he wants. Many attackers use hijacked computers to steal private data, to monitor user activity, and/or to launch further hijack attacks against other systems.
Let's explore
Read Part I
Read Part II Source: Computer Hope