The “BLURtooth” flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0.
Source link
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Related
Author: Jessica Venkat
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea