Technology ❯ Information Technology ❯ Cybersecurity ❯ Vulnerabilities
A vulnerability allows hackers to remotely track nearly any Bluetooth device by exploiting the network's core functionality.