Mobile Security
Phone on a wireless charger on a table next to a laptop![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltca8ed5aaf0930ef7/64f12eef6b0c52a53e585a8f/computermobilecharger-fusssergei-AdobeStock_278583765.jpeg?width=700&auto=webp&quality=80&disable=upscale)
Vulnerabilities & Threats![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltca8ed5aaf0930ef7/64f12eef6b0c52a53e585a8f/computermobilecharger-fusssergei-AdobeStock_278583765.jpeg?width=700&auto=webp&quality=80&disable=upscale)
'VoltSchemer' Hack Allows Wireless Charger Takeovers'VoltSchemer' Hack Allows Wireless Charger Takeovers
Researchers tested their theory on nine chargers, each different and available to consumers, and found them all vulnerable to their attacks.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.