Bluetooth

Open-source project enables Raspberry Pi Bluetooth Wi-Fi network configuration

Open-source project enables Raspberry Pi Bluetooth Wi-Fi network configuration 2024-08-02 at 06:31 By Help Net Security Remote.It released its open-source project to enable Raspberry Pi Bluetooth (BLE) Wi-Fi network configuration. The project allows a computer or mobile device to easily transfer a Wi-Fi configuration via Bluetooth, the same way users set up smart devices around […]

React to this headline:

Loading spinner

Open-source project enables Raspberry Pi Bluetooth Wi-Fi network configuration Read More »

Firmware update hides Bluetooth fingerprints

Firmware update hides Bluetooth fingerprints 2024-07-16 at 07:03 By Help Net Security A smartphone’s unique Bluetooth fingerprint could be used to track the device’s user–until now. A team of researchers has developed a simple firmware update that can completely hide the Bluetooth fingerprint, eliminating the vulnerability. Bluetooth signals from mobile devices pose privacy risks The

React to this headline:

Loading spinner

Firmware update hides Bluetooth fingerprints Read More »

BSAM: Open-source methodology for Bluetooth security assessment

BSAM: Open-source methodology for Bluetooth security assessment 2024-03-13 at 08:39 By Zeljka Zorz Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were real tests

React to this headline:

Loading spinner

BSAM: Open-source methodology for Bluetooth security assessment Read More »

Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks

Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks 08/12/2023 at 14:46 By Ionut Arghire A Bluetooth authentication bypass allows attackers to connect to vulnerable Android, Linux, and Apple devices and inject keystrokes. The post Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks Read More »

New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher

New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher 29/11/2023 at 18:01 By Ionut Arghire An academic researcher demonstrates BLUFFS, six novel attacks targeting Bluetooth sessions’ forward and future secrecy. The post New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher Read More »

CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws

CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws 06/10/2023 at 13:46 By Eduard Kovacs CISA has removed from its KEV catalog five Owl Labs video conferencing flaws that require the attacker to be in Bluetooth range. The post CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws appeared first on

React to this headline:

Loading spinner

CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws Read More »

Scroll to Top