BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys | ZDNet

All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.
All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.
Tags: AttackersAuthenticationBluetoothBLURtoothkeysletsoverwriteVulnerabilityZDNet
by HakTechs · Published November 28, 2020
by HakTechs · Published October 23, 2020
by HakTechs · Published October 14, 2020