March 13, 2024
Via: Help Net SecurityMany wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were […]
Threats & Malware, Virus & Malware
December 6, 2023
Via: The RegisterA years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm SkySafe. The bug, tracked as CVE-2023-45866, doesn’t require […]
Threats & Malware, Vulnerabilities
November 30, 2023
Via: The RegisterMultiple Bluetooth chips from major vendors such as Qualcomm, Broadcom, Intel, and Apple are vulnerable to a pair of security flaws that allow a nearby miscreant to impersonate other devices and intercept data. The weaknesses were identified by Daniele Antonioli, […]
Threats & Malware, Vulnerabilities
October 27, 2022
Via: The Hacker NewsA now-patched security flaw in Apple’s iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to eavesdrop on conversations with Siri. Apple said “an app may be able to record audio using a pair of connected […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
August 2, 2022
Via: Security WeekThe critical vulnerability is tracked as CVE-2022-20345 and it affects the System component. It has been patched with Android 12 and 12L updates. According to Google, an attacker does not require additional execution privileges to remotely execute arbitrary code over […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
June 13, 2022
Via: Security WeekThe research was conducted by Martin Herfurt, an Austria-based member of the Trifinite research group, which focuses on Bluetooth security. Herfurt’s analysis targeted a change made by Tesla in August 2021 to key card access, removing the requirement for users […]
June 10, 2022
Via: TechRadarSecurity experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but it’s a lot harder than it sounds (and not quite effective, yet). Researchers at the University of California, San […]
May 16, 2022
Via: The Hacker NewsA first-of-its-kind security analysis of iOS Find My function has demonstrated a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism […]
December 16, 2021
Via: The Hacker NewsCybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device’s Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip, putting billions of electronic devices at risk of stealthy attacks. […]
July 19, 2021
Via: Help Net SecurityBy now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links […]
Mobile, Threats & Malware, Vulnerabilities, Wireless security
May 25, 2021
Via: TechRadarCybersecurity researchers have identified a number of vulnerabilities in two critical Bluetooth services that allow attackers to hijack a pairing request in order to conduct Man-in-the-Middle (MitM) attacks. The vulnerabilities were spotted by researchers at the French National Agency for […]
May 17, 2021
Via: The Hacker NewsLatest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data […]
Mobile, Mobile security, Wireless security
March 29, 2021
Via: Panda SecurityBluetooth is an amazingly useful wireless technology built into almost every smartphone, tablet and laptop. We can use it to transfer files, play audio wirelessly, collect health data from wearable trackers and more. But like WiFi, Bluetooth is being targeted […]
May 21, 2020
Via: Dark ReadingSecurity researchers from three universities in Europe have found multiple weaknesses in the ubiquitous Bluetooth protocol that could allow attackers to impersonate a paired device and establish a secure connection with a victim. Most standard Bluetooth devices are vulnerable to […]
Mobile, Mobile security, Privacy protection
April 13, 2020
Via: Security AffairsA contact tracing app is a tool that could be used to contain new diseases, like Coronavirus, by tracking down and quarantining everyone that gets infected and localize any person that has been in contact with him/her. Contact tracing technologies […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
February 7, 2020
Via: Security WeekA total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System. One of these is CVE-2020-0022, a bug impacting the Bluetooth component, and which can […]
Threats & Malware, Vulnerabilities
August 16, 2019
Via: Help Net SecurityA newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic between two vulnerable devices. Researchers Daniele Antonioli, Nils Ole Tippenhauer and Kasper Rasmussen discovered the flaw and demonstrated a […]
Mobile security, Vulnerabilities
July 18, 2019
Via: Threat PostVulnerabilities in the way Bluetooth Low Energy is implemented on devices by manufacturers can open the door to global device tracking for the Windows 10, iOS and macOS devices that incorporate it, according to research from Boston University. An academic […]
September 14, 2018
Via: Dark ReadingOne year after Armis disclosed ‘BlueBorne,’ a large number of Android, Linux, and iOS devices remain unpatched. One year after security vendor Armis disclosed a set of nine exploitable vulnerabilities in Bluetooth, some 2 billion devices — including hundreds of […]
Application security, Vulnerabilities
September 12, 2017
Via: CSO OnlineWhat spreads through the air, is invisible to users, and requires no user interaction— no clicking, no pairing, no downloading, not even turning on discoverable mode— but could bring the hurt to billions of devices? It’s an attack vector dubbed […]