Cyber Security and Threat Intelligence
Source: Threat Post
Pet Trackers Open to MITM Attacks, Interception
Several well-rated pet trackers contain flaws stemming from the use of Bluetooth LE, poor certificate handling and more.
Your email address will not be published. Required fields are marked *
Notify me of follow-up comments by email.
Notify me of new posts by email.
VW Corporate Theme By VWThemes