Skip to content

Weaknesses Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
black pawn won chess game, weak opponent defeated superior forces

black pawn won chess game, weak opponent defeated superior forces

by mypics
$5
Evil hackers discuss breaching security

Evil hackers discuss breaching security

$10
Evil hackers happy to breach security

Evil hackers happy to breach security

$10
Security hackers breaching defenses

Security hackers breaching defenses

$10
Security hackers breaching defenses

Security hackers breaching defenses

$10
Strengths, Weaknesses, Opportunities, Threats analysis written note. SWOT Analysis.

Strengths, Weaknesses, Opportunities, Threats analysis written note. SWOT Analysis.

$6
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Hypotonia in babies, muscle weakness. Acute pediatric inpatient rehabilitation for little male

Hypotonia in babies, muscle weakness. Acute pediatric inpatient rehabilitation for little male

$7
A red man faints out from a row. Weak link. Out of order.

A red man faints out from a row. Weak link. Out of order.

by iLixe48
$5
Mature old and weak man recovering from coronavirus wearing hospital jacket

Mature old and weak man recovering from coronavirus wearing hospital jacket

$5
Depressed woman lying alone on sofa feeling tired vulnerable weak crying

Depressed woman lying alone on sofa feeling tired vulnerable weak crying

$9
Sick weak senior man feeling unwell drinking tea sitting on sofa

Sick weak senior man feeling unwell drinking tea sitting on sofa

$5
Depressed woman lying alone on sofa feeling tired vulnerable weak crying

Depressed woman lying alone on sofa feeling tired vulnerable weak crying

$9
Two percentage scales of efficiency

Two percentage scales of efficiency

by iLixe48
$5
Levels of protection. Comparison of two protection systems.

Levels of protection. Comparison of two protection systems.

by iLixe48
$5
Leadership in Action: Japanese Woman Presenting SWOT Analysis

Leadership in Action: Japanese Woman Presenting SWOT Analysis

by baffos
$5
Evil IT engineer using chroma key PC displays to build script tricking firewalls

Evil IT engineer using chroma key PC displays to build script tricking firewalls

$10
Hacker uploading USB flash drive with stolen data in PC

Hacker uploading USB flash drive with stolen data in PC

$10
Defective in rights. Stay behind the rest

Defective in rights. Stay behind the rest

by iLixe48
$5
Hacker building script able to trick firewalls, close up

Hacker building script able to trick firewalls, close up

$10
Hacker inserting USB stick in computer after managing to steal sensitive data

Hacker inserting USB stick in computer after managing to steal sensitive data

$10
Cybercriminal uploading USB containing stolen information into green screen PC

Cybercriminal uploading USB containing stolen information into green screen PC

$10
Fight the misunderstanding and indifference of others.

Fight the misunderstanding and indifference of others.

by iLixe48
$5
Breakdown of protection and collapse of the security system.

Breakdown of protection and collapse of the security system.

by iLixe48
$5
Hacker uploading USB flash drive with stolen data in PC

Hacker uploading USB flash drive with stolen data in PC

$10
Protection from threats. Defense breakdown. Security system is hacked.

Protection from threats. Defense breakdown. Security system is hacked.

by iLixe48
$5
Programming scripts shown on PC displays in empty hideout used by cybercriminals

Programming scripts shown on PC displays in empty hideout used by cybercriminals

$10
Defense breakdown. The security system is hacked.

Defense breakdown. The security system is hacked.

by iLixe48
$5
Extreme close up shot of hacking code running on computer system monitors

Extreme close up shot of hacking code running on computer system monitors

$10