Advertisement
Top

Tag: bluetooth


Mobile, Wireless security

BSAM: Open-source methodology for Bluetooth security assessment

March 13, 2024

Via: Help Net Security

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were […]


Threats & Malware, Virus & Malware

Apple and some Linux distros are open to Bluetooth attack

December 6, 2023

Via: The Register

A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm SkySafe. The bug, tracked as CVE-2023-45866, doesn’t require […]


Threats & Malware, Vulnerabilities

Weak session keys let snoops take a byte out of your Bluetooth traffic

November 30, 2023

Via: The Register

Multiple Bluetooth chips from major vendors such as Qualcomm, Broadcom, Intel, and Apple are vulnerable to a pair of security flaws that allow a nearby miscreant to impersonate other devices and intercept data. The weaknesses were identified by Daniele Antonioli, […]


Threats & Malware, Vulnerabilities

Apple iOS and macOS Flaw Could’ve Let Apps Eavesdrop on Your Conversations with Siri

October 27, 2022

Via: The Hacker News

A now-patched security flaw in Apple’s iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to eavesdrop on conversations with Siri. Apple said “an app may be able to record audio using a pair of connected […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Google Patches Critical Android Flaw Allowing Remote Code Execution via Bluetooth

August 2, 2022

Via: Security Week

The critical vulnerability is tracked as CVE-2022-20345 and it affects the System component. It has been patched with Android 12 and 12L updates. According to Google, an attacker does not require additional execution privileges to remotely execute arbitrary code over […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars

June 13, 2022

Via: Security Week

The research was conducted by Martin Herfurt, an Austria-based member of the Trifinite research group, which focuses on Bluetooth security. Herfurt’s analysis targeted a change made by Tesla in August 2021 to key card access, removing the requirement for users […]


Mobile, Wireless security

You can now add Bluetooth to the list of privacy threats to be worried about

June 10, 2022

Via: TechRadar

Security experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but it’s a lot harder than it sounds (and not quite effective, yet). Researchers at the University of California, San […]


Mobile, Wireless security

Researchers Find Way to Run Malware on iPhone Even When It’s OFF

May 16, 2022

Via: The Hacker News

A first-of-its-kind security analysis of iOS Find My function has demonstrated a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism […]


Mobile, Wireless security

Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips

December 16, 2021

Via: The Hacker News

Cybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device’s Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip, putting billions of electronic devices at risk of stealthy attacks. […]


Mobile, Wireless security

Protect your smartphone from radio-based attacks

July 19, 2021

Via: Help Net Security

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links […]


Mobile, Threats & Malware, Vulnerabilities, Wireless security

Bluetooth security holes open door to device impersonation attacks

May 25, 2021

Via: TechRadar

Cybersecurity researchers have identified a number of vulnerabilities in two critical Bluetooth services that allow attackers to hijack a pairing request in order to conduct Man-in-the-Middle (MitM) attacks. The vulnerabilities were spotted by researchers at the French National Agency for […]


Mobile, Mobile security

Apple’s Find My Network Can be Abused to Exfiltrate Data From Nearby Devices

May 17, 2021

Via: The Hacker News

Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending “Find My Bluetooth” broadcasts to nearby Apple devices. “It’s possible to upload arbitrary data […]


Mobile, Mobile security, Wireless security

How hackers are targeting your phone through Bluetooth

March 29, 2021

Via: Panda Security

Bluetooth is an amazingly useful wireless technology built into almost every smartphone, tablet and laptop. We can use it to transfer files, play audio wirelessly, collect health data from wearable trackers and more. But like WiFi, Bluetooth is being targeted […]


Mobile, Wireless security

Most Bluetooth Devices Vulnerable to Impersonation Attacks

May 21, 2020

Via: Dark Reading

Security researchers from three universities in Europe have found multiple weaknesses in the ubiquitous Bluetooth protocol that could allow attackers to impersonate a paired device and establish a secure connection with a victim. Most standard Bluetooth devices are vulnerable to […]


Mobile, Mobile security, Privacy protection

Apple and Google join forces to develop Contact Tracing app against Coronavirus

April 13, 2020

Via: Security Affairs

A contact tracing app is a tool that could be used to contain new diseases, like Coronavirus, by tracking down and quarantining everyone that gets infected and localize any person that has been in contact with him/her. Contact tracing technologies […]


Mobile, Mobile security, Threats & Malware, Vulnerabilities

Critical Bluetooth Vulnerability Exposes Android Devices to Attacks

February 7, 2020

Via: Security Week

A total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System. One of these is CVE-2020-0022, a bug impacting the Bluetooth component, and which can […]


Threats & Malware, Vulnerabilities

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

August 16, 2019

Via: Help Net Security

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic between two vulnerable devices. Researchers Daniele Antonioli, Nils Ole Tippenhauer and Kasper Rasmussen discovered the flaw and demonstrated a […]


Mobile security, Vulnerabilities

Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices

July 18, 2019

Via: Threat Post

Vulnerabilities in the way Bluetooth Low Energy is implemented on devices by manufacturers can open the door to global device tracking for the Windows 10, iOS and macOS devices that incorporate it, according to research from Boston University. An academic […]


Vulnerabilities

2 Billion Bluetooth Devices Remain Exposed to Airborne Attack Vulnerabilities

September 14, 2018

Via: Dark Reading

One year after Armis disclosed ‘BlueBorne,’ a large number of Android, Linux, and iOS devices remain unpatched. One year after security vendor Armis disclosed a set of nine exploitable vulnerabilities in Bluetooth, some 2 billion devices — including hundreds of […]


Application security, Vulnerabilities

5.3 billion devices at risk for invisible, infectious Bluetooth attack

September 12, 2017

Via: CSO Online

What spreads through the air, is invisible to users, and requires no user interaction— no clicking, no pairing, no downloading, not even turning on discoverable mode— but could bring the hurt to billions of devices? It’s an attack vector dubbed […]