Most Bluetooth Devices Vulnerable to Impersonation Attacks
Most Bluetooth Devices Vulnerable to Impersonation Attacks
Vulnerabilities in the Bluetooth authentication process give attackers a way to insert rogue devices between two securely paired devices, academic researchers find.