BlueBorne: bluetooth attack
BlueBorne: bluetooth attack A vulnerability called BlueBorne has been found that can be exploited without the user interacting in any way with the device, just simply bluetooth is active. Potentially, the risk is in the order of 8 billion devices of every kind, from ordinary computers to phones, IoT devices such as TVs, watches and […]