![Blueborne - "just" a spectacular find or the next everyday threat?](/fileadmin/_processed_/e/1/G_DATA_SecurityBlog__2016_Placeholder_05_49774ae500.jpg)
Blueborne - "just" a spectacular find or the next everyday threat?
A few days ago reports emerged about a collection of vulnerabilities on the Bluetooth protocol suite. Those allow an attacker to gain complete control over a vulnerable target device without the victim being aware of the attack. What are the consequences for users and how relevant are the examples?