A proof of concept attack uses malware to turn headphones into microphones that can eavesdrop from across a room.
Security and tech news with Xploiter.com
Be Safe, Be Secure
A proof of concept attack uses malware to turn headphones into microphones that can eavesdrop from across a room.