Discarded, not destroyed: Old routers reveal corporate secrets

In the wrong hands, the data gleaned from the devices – including customer data, router-to-router authentication keys, application lists, and much more – is enough to launch a cyberattack.

>>More