Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
from Dark Reading: https://ift.tt/2XnGfX4
via IFTTT
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
from Dark Reading: https://ift.tt/2XnGfX4
via IFTTT