If your phone has features like Bluetooth and NFC, it could possibly be accessible from nearby under the right conditions. These features allow nearby devices to send/receive data from your phone, usually with your permission. These features could be exploited if a security vulnerability was present. However you do not really hear about these types of attacks, which would indicate they are not very common.
Author
Replies
Viewing 1 reply thread
You must be a Komando Community member to reply to this post. Sign up or log in.
Want to join the conversation?
New posts can be created by Komando Community members.