An attacker could connect to that HotSpot and capture the information transferred between those devices, Core Security said.
source: www.techworm.net
An attacker could connect to that HotSpot and capture the information transferred between those devices, Core Security said.
source: www.techworm.net