Tag:

devices

Bluetooth vulnerabilities allow attackers to spoof legitimate devices

New vulnerabilities have been discovered in the Bluetooth Core and Mesh specifications that allow a man-in-the-middle (MitM) attack. "Devices that support the Bluetooth Core and...