:::: MENU ::::

Howk IT-Dienstleistungen

Howk IT Services – Howk IT-Dienstleistungen

BLURtooth Security Vulnerability Allows Hackers To Slice Through Bluetooth Encryption

  • Sep 13 / 2020
  • 0
Hi Tech

BLURtooth Security Vulnerability Allows Hackers To Slice Through Bluetooth Encryption

BLURtooth Security Vulnerability Allows Hackers To Slice Through Bluetooth Encryption
These days just about everybody takes Bluetooth for granted. Manufacturers phase out useful physical ports like headset jacks in high end devices with the expectation that buyers will use Bluetooth headphones. Our cars, watches, locator tags, home theaters, and even game controllers rely on the ubiquitous short-range wireless network protocol.

Leave a comment