Tuesday, December 1, 2015

Crypto Reuse Opens Up Millions of Connected Devices to Attack

Impersonation, man-in-the-middle or passive decryption attacks could allow access to administrator credentials and sensitive info.

from http://ift.tt/1lue3Nc

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.