Get a Pentest and security assessment of your IT network.

Cyber Security

Bluetooth flaws allow attackers to impersonate legitimate devices

The Bluetooth Core and Mesh Profile specifications define requirements needed by Bluetooth devices to communicate with each other. Vulnerabilities could enable attackers to launch MitM attacks while within wireless range of vulnerable devices. Android Open Source Project, Cisco, Intel, Red Hat, Microchip Technology, and Cradlepoint are among the vendors identified so far with products impacted by these security flaws. The vulnerabilities were discovered by researchers at the Agence nationale de la s..curit.. des syst..mes d’information (ANSSI)

Source: https://www.bleepingcomputer.com/news/security/bluetooth-flaws-allow-attackers-to-impersonate-legitimate-devices/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security