The attacks carried out by exploiting BLURtooth vulnerability are being referred to as the BLUR attacks.
September 10, 2020
The vulnerability was revealed in a report called “The EMV Standard: Break, Fix, Verify.” Every time we make…
August 29, 2020
The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a…
July 25, 2018