02-16-2018, 10:47 PM
All BlueTooth devices are vulnerable BUT since BT has limited range and not all devices will "accept" the resquests done by the malware (i.e. a BT headphone just won't care when asked to install software, etc.), application of the malware are limited.
Also, a second layer should "ask" the user to install programs.
To be on the safe side, always disable BT on computers/phones when not in use and if secury is crucial... always use a hard line (wires) and for critical system, just don't connect to them to the internet.
Cheers!
Also, a second layer should "ask" the user to install programs.
To be on the safe side, always disable BT on computers/phones when not in use and if secury is crucial... always use a hard line (wires) and for critical system, just don't connect to them to the internet.
Cheers!
- TheDead (TheUxNo0b)
If my blabbering was helpful, please click my [Thank] link.
If my blabbering was helpful, please click my [Thank] link.