If your phone has features like Bluetooth and NFC, it could possibly be accessible from nearby under the right conditions. These features allow nearby devices to send/receive data from your phone, usually with your permission. These features could be exploited if a security vulnerability was present. However you do not really hear about these types of attacks, which would indicate they are not very common.
Want to join the conversation?
New posts can be created by Komando Community members.