The attack utilizes a Raspberry Pi and off-the-shelf Wi-Fi adapters. It took some time to find the right combination of hardware.
Read full article on Extreme Tech
The attack utilizes a Raspberry Pi and off-the-shelf Wi-Fi adapters. It took some time to find the right combination of hardware.
Read full article on Extreme Tech