Get a Pentest and security assessment of your IT network.

Cyber Security

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

The BLURtooth flaw allows attackers within wireless range to bypass authentication keys and snoop on Bluetooth devices. The issue exists in the pairing process for Bluetooth 4.0 through 5.0 implementations. This pairing process is called Cross-Transport Key Derivation (CTKD) A hole in CTKD makes it possible to lower the strength of these encryption keys. That in turn paves the way for an attacker to pair their own devices to the target s device, with no authentication needed. The attacker could then sniff out communications between the two devices.

Source: https://threatpost.com/bluetooth-bug-mitm-attacks/159124/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security