If an attacker can covertly pair their seeker with vulnerable headphones or earbuds, they could obtain complete control over it, including tampering with controls such as volume. More importantly, ...
Researchers have shared information about a set of attacks they call WhisperPair, which exploit Fast Pair to gain access to ...