The Latest in IT Security

BlueBorne Bluetooth Attack Leaves Billions of Devices Vulnerable



A series of vulnerabilities recently found in the Bluetooth communication protocol, used by billions of smartphones, laptops, PCs, and IoT devices around the world, could be exploited by attackers to compromise popular operating systems without any interaction from the user.

By compromising the Bluetooth communication protocol, over-the-air, an attacker could perform man-in-the-middle attacks or remotely execute malicious code on a victim’s device to gain full remote control of the device. Operating systems such as Windows, Linux, Android, and iOS are affected, and security researchers at Armis – who discovered the vulnerability – suggest the attack is completely undetectable.

Read More

Leave a reply


MONDAY, MARCH 01, 2021

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments