Security experts explained that unlike other hacking strategies, in this case, the hackers
did not need to deceive users into taking a wrong step for hacking or infecting neither did the
victim’s device had to be paired with the hacker’s device. Instead, it was simply possible to hack
the victims if only their Bluetooth was enabled; a setting which is mostly common in today’s
IoT devices.
Moreover, it was also concluded that these aected IoT devices could be further misused to
infect other IoT devices which can include air-gapped and segregated devices with a turned-on
Bluetooth. According to an expert, this is an airborne attack vector or de ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.