The organizations behind the Bluetooth wireless technology has published guidance today on how device vendors can mitigate a new attack on Bluetooth capable devices. Named BLURtooth, this is a ...
Security concerns with Bluetooth involve the quality of the cryptographic algorithm, key management and authentication protocols. As important as these are, however, they are not the largest areas of ...