Adding to what @rocks said…
If ECDSA signatures are produced correctly, re-using an address for multiple outgoing transactions does not pose a security problem. When the first ECDSA signature associated with a particular bitcoin address becomes public, the address's public key becomes known. This reduces the security with which the remaining bitcoins are protected from 160 bits to 128 bits. Cracking 128-bit security is still
far beyond our present capabilities. Also note that producing a bitcoin-signed message from that address (e.g., to publically prove control of funds) would have the same effect of reducing the security from 160 bits to 128 bits.
Producing additional ECDSA signatures (additional outbound TXs) from that address has no meaningful effect on security either,
provided the k-values used in signature generation remain unknown. As an example, the address
12WRnQR85ZUT7dhmaHBNL5dde2QLYieW6v presently holds $24,000,000 of bitcoins and has made multiple outgoing transactions. For each outgoing transaction from this address, we can inspect the signatures and determine the R values. This doesn't help us "hack" the address to any meaningful extent
except in the case where the signatures were produced incorrectly (for example, by using a low-entropy k-value).
The point I want to make is that this is not some "discovery" of some flaw in ECDSA. The thefts due to re-used or low-entropy R/k values are a result of buggy software.
The solution is for the community to demand that bitcoin hardware and software wallets use deterministic signatures, for example following
RFC6979. When RFC6979 is used, the k-value used for producing the ECDSA signature is derived deterministically from the message and the private key. This has the benefit of
(1) eliminating the need for a RNG when producing signatures (and thus the risk of using a flawed RNG)
(2) making software/hardware audits much simpler (just load test private keys and make sure the signatures match what's expected [it's very difficult to audit a RNG, on the other hand])
Adding deterministic signatures is not a significant software project either. Basically, rather than calling a random number generator when selecting k:
k = random256bits()
we pass the private key and the message to an RFC6979 library function instead:
k = rfc6979(privkey, message)
This rest of the code remains unchanged.