Bluetooth security holes open door to device impersonation attacks
Vulnerabilities in critical specifications puts a whole lot of Bluetooth devices at the risk of MitM attacks.
Vulnerabilities in critical specifications puts a whole lot of Bluetooth devices at the risk of MitM attacks.