https://www.business-standard.com/article/technology/bluebugging-how-hackers-use-your-bluetooth-enabled-devices-to-steal-data-122112901122_1.html
Understanding the mechanism of the crime and the steps you must take to evade it
Create an account or login to join the discussion