"The BlueBorne attack vector requires no user interaction, is compatible to all software versions, and does not require any preconditions or configurations aside of the Bluetooth being active. "
You know something is wrong with the software world when the only truly compatible pieces are the vulnerabilities.
antialias_physorg
Sep 13, 2017You know something is wrong with the software world when the only truly compatible pieces are the vulnerabilities.