![]() The good news is that manufacturers were alerted to the risks of BlueBorne weeks before the news went public. Most worrying is that the BlueBorne hack works on almost every smartphone – Apple, Android and Windows Mobile devices are all vulnerable to attack. And it takes less than 10 seconds for them to break in. Known as “BlueBorne”, the technique can be used by hackers to connect to a nearby phone, install malware, steal data, or delete important personal information. It’s so useful that many people leave it switched on all the time.īut researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |