Face some new hacking techniques related to Bluetooth technology
hackers can easily take advantage of the vulnerabilities available in the bluetooth protocol to deploy various infringing activities.
hackers can easily take advantage of the vulnerabilities available in the bluetooth protocol to deploy various infringing activities.
on tuesday, researchers at armis labs published details of a new attack that they thought could potentially affect all devices that could use bluetooth.