Tag:

Bluetooth

iPhone prone to malware when turned off

Install malware on a smartphone while it is turned off? Researchers have found that this is a realistic scenario. They managed to install malicious software on...

Bluetooth vulnerabilities allow attackers to spoof legitimate devices

New vulnerabilities have been discovered in the Bluetooth Core and Mesh specifications that allow a man-in-the-middle (MitM) attack. "Devices that support the Bluetooth Core and...