This Week in Security: Bluetooth Hacking, NEC Phones, and Malicious Tor Nodes
One of the fun things about vulnerability research is that there are so many places for bugs to hide. Modern devices have multiple processors, bits of radio hardware, and millions of lines of code. When [Veronica Kovah] of Dark Mentor LLC decided to start vulnerability research on the Bluetooth Low …read more
Continue reading This Week in Security: Bluetooth Hacking, NEC Phones, and Malicious Tor Nodes