New Attack exploiting serious Bluetooth weakness can intercept sensitive data

What’s more, the security notice from the Bluetooth Special Interest Group said: For an attack to be successful, an attacking device would need to be within wireless range of two vulnerable Bluetooth devices that were establishing a BR/EDR connection.

Read full article on Technology Lab – Ars Technica

 


Date:

Categorie(s):