A French research team with EURECOM has discovered a scary Bluetooth security flaw. Using a brute-force attack, a man-in-the-middle (MitM) operator could spoof two connected devices using Bluetooth ...
Security researchers have uncovered a serious Bluetooth vulnerability that could allow hackers to silently hijack wireless ...
The Bluetooth Special Interest Group (SIG) is dismissing security fears about the technology, saying any flaws in it are limited to a small number of mobile phones — although it has detailed measures ...
Much of the Bluetooth wireless security model is optional but network executives should start setting policies for handling the short-range radio technology, according to new Gartner Inc. research. A ...
Forbes contributors publish independent expert analyses and insights. Alex Vakulov is a cybersecurity expert focused on consumer security. Bluetooth technology has become an essential part of our ...
Be careful the next time you turn on your Bluetooth-enabled phone: You could unknowingly be opening the door to a nasty intruder who could steal confidential information such as your address book or ...
As we first reported in yesterday’s weekly security post, researchers at EURECOM have revealed the details (PDF, references) of a new man-in-the-middle (MITM) attack on Bluetooth 4.2 through 5.4, ...
Bluetooth devices are ubiquitous in modern life, connecting everything from our headphones to smart home gadgets. However, the convenience of wireless technology comes with concerns about privacy and ...
After two Israeli researchers published a paper earlier this month explaining how security mechanisms in short-range wireless Bluetooth technology could be quickly undermined, members of the Bluetooth ...
Potential security risks posed by the Bluetooth wireless technology are prompting some IT managers to rein in use of Bluetooth-equipped mobile phones and PCs on their networks. Bluetooth vendors are ...