Since secondhand equipment is discounted, it would potentially be feasible for cybercriminals to invest in purchasing used devices to mine them for information and network access and then use the inf… [+2881 chars]Read More
Used routers often come loaded with corporate secrets Ars Technica
