The Latest in IT Security

Posts Tagged ‘bluetooth’

Researchers disclosed a bevy of Bluetooth vulnerabilities Tuesday that threaten billions of devices from Android and Apple smartphones to millions of printers, smart TVs and IoT devices that us the short-range wireless protocol. Worse, according to researchers at IoT security firm Armis that found the attack vector, the so-called “BlueBorne” attacks can jump from one […]

Read more ...

Security researchers used the recent Def Con hackers’ convention to show just how easily some Bluetooth-based smart locks can be opened. Researchers Ben Ramsey and Anthony Rose of Merculite Security took a look at 16 smart locks from companies such as Ceomate, Elecycle, iBlulock, Mesh Motion, Okidokey, Plantraco, Quicklock, and Vians. Ramsey and Rose discovered that […]

Read more ...

Researchers at Context Information #security have demonstrated how easy it is to monitor and record #bluetooth Low Energy signals transmitted by many #mobile phones, wearable devices and iBeacons, including the iPhone and leading fitness monitors, raising concerns about #privacy and confidentiality. The researchers have even developed an #android app that scans, detects and logs wearable devices. […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments