BP 5/20

BP 5/20: Bluetooth's Complexity Has Become a Security Risk WHat is the BlueBorne flaw? How is Bluetooth developed? How can malicious...