By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.
Read the original post by Lily Hay Newman
Consumer Electronics in the News
By exploiting flaws in popular video conferencing hardware from DTEN, attackers can monitor audio, capture slides—and take full control of devices.
Read the original post by Lily Hay Newman