A security researcher demonstrated that a malicious ebook file could exploit a Kindle's software to grant an attacker complete control…
Read More »A security researcher demonstrated that a malicious ebook file could exploit a Kindle's software to grant an attacker complete control…
Read More »