Apple and some Linux distros are open to Bluetooth attack
Briefly

"The vulnerabilities work by tricking the Bluetooth host state-machine into pairing with a fake keyboard without user-confirmation. The underlying unauthenticated pairing mechanism is defined in the Bluetooth specification, and implementation-specific bugs expose it to the attacker."
Read at Theregister
[
add
]
[
|
|
]