Z zoran macrumors 601 Original poster Jun 30, 2005 4,881 136 Dec 31, 2017 #1 I haven't understood how can a user be attacked by BlueBorne? Does he have to be using Bluetooth or be in Wifi mode or what?
I haven't understood how can a user be attacked by BlueBorne? Does he have to be using Bluetooth or be in Wifi mode or what?