Tech

Wireless standard: Bluetooth security vulnerability affects practically all devices

Bluetooth does not require two-way authentication when establishing a connection. The attack bias works as a master and a slave. (Bluetooth, Intel)