A few days ago reports emerged about a collection of vulnerabilities on the Bluetooth protocol suite. Those allow an attacker to gain complete control over a vulnerable target device without the victim being aware of the attack. What are the consequences for users and how relevant are the examples?
Article Link: http://feeds.feedblitz.com/~/461585586/0/gdatasecurityblog-en~Blueborne-just-a-spectacular-find-or-the-next-everyday-threat