Home > Cyber Security News > #bluetooth

Multiple Bluetooth Vulnerabilities Allowed Spoofing Legit Devices

Vendors are patching and deploying fixes for six different vulnerabilities in Bluetooth Core and Mesh specifications allowing MiTM attacks.

Bluetooth flaws allow attackers to impersonate legitimate devices

Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks.

Bug in Apple's Find My Feature Could've Exposed Users' Location Histories

Experts Detail How Apple’s Crowd-Sourced Bluetooth Location Tracking System Could Have Exposed Users Location Reports.

Bluetooth Spoofing Bug Affects Billions of IoT Devices

A team of academic researchers have discovered a Bluetooth Low Energy (BLE) vulnerability that allows spoofing attacks that could affect the way humans and machines carry out tasks. It potentially impacts billions of Internet of Things (IoT) devices, researchers said, and remains unpatched in Android devices.

FOLLOW US:
Facebook logo Twitter logo LinkedIn logo Instagram logo Telegram logo