Crypto Reuse Opens Up Millions of Connected Devices to Attack
Impersonation, man-in-the-middle or passive decryption attacks could allow access to administrator credentials and sensitive info.
from http://ift.tt/1lue3Nc
from http://ift.tt/1lue3Nc