![]() Even with other devices that a few years ago would not have seemed implausible, such as a toothbrush or a coffee machine. We use it to listen to music, to share information, when working with wireless mice and keyboards or when interacting with smart speakers. In one way or another, Bluetooth is a technology that accompanies us in our daily lives almost without us realizing it. In this first installment, we present BIAS and BLESA, two of the threats to the security of wireless devices Tarlogic starts a series of articles analyzing Bluetooth attacks. BLESA: Bluetooth Low Energy Spoofing Attacks
0 Comments
Leave a Reply. |