![]() ![]() In addition, the process of taking advantage of the misconfiguration is difficult. The catch is that the attacker must be within about 30 feet of the target to exploit the vulnerability. According to Google, a misconfiguration in its Bluetooth pairing protocols makes it possible for an attacker to communicate with the security key or communicate with the device to which the security key is being paired. Yubico’s concern turned out to be well-founded and is exactly what happened with the Bluetooth version of the Titan Security Key, which is sold alongside the USB version. Google is making Android devices work better together with expanded Fast Pairing ![]() Update Google Chrome now to protect yourself from an urgent security bug ![]() Half of Google Chrome extensions may be collecting your personal data ![]()
0 Comments
Leave a Reply. |