Vulnerabilities found in Bluetooth Low Energy gives hackers access to numerous devices
Cybersecurity researchers at NCC Group have found a critical flaw in Bluetooth Low Energy (BLE) receivers. The flaw may grant cyber criminals access to a range of devices, including phones, laptops, cars, and houses. NCC Group details how BLE uses proximity to authenticate that the user is within a close
NSA Warns Public Networks are Hacker Hotbeds
The NSA has warned that attackers are targeting teleworkers taking advantage of free public networks to steal corporate data that may be sensitive. The US National Security Agency offered advice to security teams that are seeking the best wireless practices to protect corporate networks and personal devices. According to the
Bluetooth bugs open the door for attackers to impersonate devices
New vulnerabilities in devices with Bluetooth Core and Mesh have been uncovered by researchers at the Agence nationale de la sécurité des systèmes d’information (ANSSI). The bugs were disclosed on Monday and could allow a threat actor to impersonate devices during pairing, leading to man-in-the-middle attacks. Carnegie Mellon University also
This Bluetooth Attack Can Steal a Tesla Model X in Minutes
A security researcher from Belgian university KU Leuven has revealed a series of security vulnerabilities he uncovered in both Tesla Model X cars and their keyless entry fobs. The researchers, Lennert Wouters, claims that the vulnerabilities can be exploited together and lead to an adversary breaking into the car and
Google warns of severe ‘BleedingTooth’ Bluetooth flaw in Linux kernel
A new vulnerability has been disclosed by Google, a high-severity flaw that affects Linux devices. The bug reportedly lies in the Bluetooth stack within Linux kernel versions 5.9 and below that support BlueZ. Cybersecurity firms are urging users to update the Linux kernel to version 5.9, which was released just
Bluetooth Spoofing Bug Affects Billions of IoT Devices
Academic researchers at Purdue University have discovered a vulnerability within Bluetooth Low Energy (BLE) that could allow for spoofing attacks. This bug remains unpatched in Android devices, potentially impacting millions of consumers and billions of IoT devices. The BLE spoofing vulnerability is likely a result of security experts overlooking the
Bluetooth Bug Could Allow MITM Attacks
A new vulnerability within Bluetooth has been discovered by security researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University. The flaw could potentially allow attackers to perform malicious man in the middle attacks, obtaining access to private services and sensitive information. The bug lies in the Cross-Transport
Google and Apple Change Tactics on Contact Tracing Tech
In April, Apple and Google announced that they would team up to combat COVID-19 outbreaks and the ongoing pandemic through developing a contact tracing app utilizing Bluetooth signals from smartphones. The contact tracing was designed to help alert users to potential exposures, as well as help public health officials to
Japanese Firm Unveils Smart Face Mask That Connects To Phones
A Japanese startup has designed and released a new smart face mask that connects to phones, lets users make calls remotely, and can amplify the wearer’s voice in case they can’t be heard clearly through the mask. The mask can also send messages via speech. The company behind the new
State-Based Contact-Tracing Apps Could Be a Mess
Worldwide, governments have been exploring contact tracing options that utilize technology, aiming to combat the spread of COVID-19. The United States has not done so yet, and it seems as though the apps will be deployed on a state-to-state basis, leaving room for potential backlash or deliberation over which states