am on Nostr: How Hackers Use Bluetooth to Take Over Your Mac Device ...
Published at
2023-12-04 20:08:12Event JSON
{
"id": "b780803ba18e7efbac2027b4592e4f6d696b4ecdc1c33c6804c856c42c2dc09f",
"pubkey": "238db7a6bc3d3abc7acddea9bf0aec1eaaae7e70d9f5bafd26cca16982a60244",
"created_at": 1701720492,
"kind": 1,
"tags": [
[
"r",
"https://www.threatlocker.com/blog/mac-bluetooth-impersonation-attacks"
]
],
"content": "How Hackers Use Bluetooth to Take Over Your Mac Device\n https://www.threatlocker.com/blog/mac-bluetooth-impersonation-attacks",
"sig": "db1df746caeafeca72ef21162418590aa4b60981e49e54f4a471d0ebd088d65851f6b07165fae0bfb6c4b0ce6a85146b337cddab850b4bb595e0d66348736bba"
}