The organizations behind the Bluetooth wireless technology has published guidance today on how device vendors can mitigate a new attack on Bluetooth capable devices. Named BLURtooth, this is a ...
Security concerns with Bluetooth involve the quality of the cryptographic algorithm, key management and authentication protocols. As important as these are, however, they are not the largest areas of ...
A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others. Academic researchers have uncovered security vulnerabilities in ...
Security researchers from three universities in Europe have found multiple weaknesses in the ubiquitous Bluetooth protocol that could allow attackers to impersonate a paired device and establish a ...
KIRKLAND, Wash.--(BUSINESS WIRE)--The Fast IDentity Online (FIDO) Alliance, the non-profit organization focused on changing the nature of online authentication, entered into a memorandum of ...
If Bluetooth headsets and mice are decluttering the wiring in your organization, take note: Researchers have unleashed two new Bluetooth hacking tools. One tool -- Hidattack -- let attackers hijack a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results