Most Bluetooth Devices Vulnerable to Impersonation Attacks

Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.
21 May 2020


>>More