Updated: Researchers were able to exploit a protocol design feature on a vast scale.
Computing, Web, Networks, Security and Breaches
the alter ego of Jeffric Pisuena

Updated: Researchers were able to exploit a protocol design feature on a vast scale.