Security concerns with Bluetooth involve the quality of the cryptographic algorithm, key management and authentication protocols. As important as these are, however, they are not the largest areas of ...
The organizations behind the Bluetooth wireless technology has published guidance today on how device vendors can mitigate a new attack on Bluetooth capable devices. Named BLURtooth, this is a ...
A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others. Academic researchers have uncovered security vulnerabilities in ...
Security researchers from three universities in Europe have found multiple weaknesses in the ubiquitous Bluetooth protocol that could allow attackers to impersonate a paired device and establish a ...
KIRKLAND, Wash.--(BUSINESS WIRE)--The Fast IDentity Online (FIDO) Alliance, the non-profit organization focused on changing the nature of online authentication, entered into a memorandum of ...
If Bluetooth headsets and mice are decluttering the wiring in your organization, take note: Researchers have unleashed two new Bluetooth hacking tools. One tool -- Hidattack -- let attackers hijack a ...
A new report from ZDNet exposes that a new Bluetooth vulnerability called BLURtooth has emerged. This allows the attackers to weaken and overwrite the Bluetooth encryption giving access to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results