
Two security holes — one particularly gnarly — could allow hackers the freedom to do as they wish with the popular edge equipment.
Two security holes — one particularly gnarly — could allow hackers the freedom to do as they wish with the popular edge equipment.