Get a Pentest and security assessment of your IT network.

Cyber Security

Bluetooth flaws allow attackers to impersonate legitimate devices

The Bluetooth Core and Mesh Profile specifications define requirements needed by Bluetooth devices to communicate with each other. Vulnerabilities could enable attackers to launch MitM attacks while within wireless range of vulnerable devices. Android Open Source Project, Cisco, Intel, Red Hat, Microchip Technology, and Cradlepoint are among the vendors identified so far with products impacted by these security flaws. The vulnerabilities were discovered by researchers at the Agence nationale de la s..curit.. des syst..mes d’information (ANSSI)

Source: https://www.bleepingcomputer.com/news/security/bluetooth-flaws-allow-attackers-to-impersonate-legitimate-devices/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation