A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.
I test Android phones for a living, but I write about them using a company-supplied MacBook Air. Both platforms are great in ...