BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys | ZDNet

All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.
All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.
Tags: AttackersAuthenticationBluetoothBLURtoothkeysletsoverwriteVulnerabilityZDNet
by HakTechs · Published March 3, 2021
by HakTechs · Published October 31, 2020
by HakTechs · Published June 12, 2021
Best Articles