ethical-hacker video for an IoT security consultant notices that device firmware updates are transmitted unencrypted. What type of attack could exploit this
An IoT security consultant notices that device firmware updates are transmitted unencrypted. What type of attack could exploit this vulnerability?