Security risks involving bluetooth vulnerabilities include techniques known as: bluebugging, bluesnarfing, bluejacking, denial of service and exploits...
Bluetooth is one of the widely used protocol there is. These days we have so many Bluetooth devices all around us. We have Bluetooth keyboard, mouse,...