securityaffairs<p><a href="https://infosec.exchange/tags/PerfektBlue" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PerfektBlue</span></a> <a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bluetooth</span></a> attack allows hacking infotainment systems of Mercedes, Volkswagen, and Skoda<br><a href="https://securityaffairs.com/179789/hacking/perfektblue-bluetooth-attack-allows-hacking-infotainment-systems-of-mercedes-volkswagen-and-skoda.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179789/hac</span><span class="invisible">king/perfektblue-bluetooth-attack-allows-hacking-infotainment-systems-of-mercedes-volkswagen-and-skoda.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/carhacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>carhacking</span></a></p>