Most Bluetooth Devices Vulnerable to Impersonation Attacks

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Watchdog
    PCHF Bot
    • Apr 2016
    • 19189

    #1

    Most Bluetooth Devices Vulnerable to Impersonation Attacks

    Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.

    Continue reading…
Working...