Bluetooth

Cyber SecurityNews

BrakTooth Proof of Concept Tool Demonstrates Bluetooth Vulnerabilities

The Bluetooth Classic (BT) protocol is a widely used wireless protocol in laptops, handheld devices, and audio devices.  On November

Read More
Mobile AppsNews

Apple and Google partner on COVID-19 contact tracing technology

Across the world, governments and health authorities are working together to find solutions to the COVID-19 pandemic, to protect people

Read More
NewsSecurity Vulnerabilities

Sweyntooth Bluetooth Module Vulnerabilities

Sweyntooth is a collection of vulnerabilities that are known to affect several Bluetooth Low Energy (BLE) modules from different manufacturers. This potentially

Read More
NewsSecurity News

Bluetooth vulnerability [Key Negotiation of Bluetooth]

A vulnerability in Bluetooth’s wireless standard has been discovered by researchers which could allow attackers to intercept keystrokes, address books,

Read More
NewsSecurity Vulnerabilities

Texas Instruments Bluetooth Low Energy Denial of Service and Remote Code Execution Vulnerability [CVE-2018-16986]

On November 1st, 2018, Armis announced the presence of a Remote Code Execution (RCE) or Denial of Service (DoS) vulnerability

Read More
NewsSecurity Vulnerabilities

Multiple Bluetooth Implementations Information Disclosure [CVE-2018-5383]

CVE Number – CVE-2018-5383 Bluetooth firmware or operating system software drivers may not sufficiently validate elliptic curve parameters used to

Read More