A blog about embedded computing systems, cyber-physical systems, and Internet of Things. We concentrate on technical topics but also discuss their implications.
Thursday, September 14, 2017
New Bluetooth Vulnerability
Extremetech reports here on a new Bluetooth vulnerability. This vulnerability does not require pairing and can be exploited under a wide variety of conditions. It provides a serious breach, for example bridging air gaps.