Watch this video on YouTube
A company’s Wi-Fi network was breached, and the attack was traced back to an exploitation of weak encryption methods. Which encryption method is most vulnerable to such attacks?