NCC Group has found proof of concept that BLE devices can be exploited from anywhere on the planet.
The post Vulnerabilities found in Bluetooth Low Energy gives hackers access to numerous devices appeared first on TechRepublic.
NCC Group has found proof of concept that BLE devices can be exploited from anywhere on the planet.
The post Vulnerabilities found in Bluetooth Low Energy gives hackers access to numerous devices appeared first on TechRepublic.