The Latest in IT Security

Posts Tagged ‘bluetooth’

Security experts have found a way to track people using the Bluetooth chips integrated into their mobile devices, and laptops, but it’s a lot harder than it sounds (and not quite effective, yet). Researchers at the University of California, San Diego, have discovered that each individual Bluetooth chip has a tiny imperfection, created during the […]

Read more ...

A first-of-its-kind security analysis of iOS Find My function has demonstrated a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism takes advantage of the fact that wireless chips related to Bluetooth, Near-field communication (NFC), and […]

Read more ...

Many adults found it charming when Mattel upgraded its classic Fisher-Price Chatter telephone for its 60th anniversary in October with actual Bluetooth capabilities, so grownups, too, can use it — and for actual mobile phone calls. But flaws in the way the toy pairs with Bluetooth means that other people with nefarious intentions can potentially […]

Read more ...


Categories

SATURDAY, APRIL 20, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments