Get a Pentest and security assessment of your IT network.

News

Bluetooth Technology Website

Researchers identified a security vulnerability related to encryption on Bluetooth BR/EDR connections. Researchers identified that it is possible for an attacking device to interfere with the procedure used to set up encryption on a connection between two devices in such a way as to reduce the length of the encryption key used. Bluetooth products exist in the field that may not currently perform the required step to verify the negotiated encryption key meets the minimum length. There is no evidence that the vulnerability has been exploited maliciously and the Bluetooth SIG is not aware of any devices implementing the attack having been developed.”]

Source: https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/statement-key-negotiation-of-bluetooth/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones