7 New Bugs in Bluetooth Let Hackers Impersonate As Legitimate Device & Launch DDoS Attacks

7 New Bugs in Bluetooth Let Hackers Impersonate As Legitimate Device & Launch DDoS...

Bluetooth is currently used in millions of devices, and the Carnegie Mellon CERT Coordination Center (CERT/CC) has recently reported 7 security flaws...
SweynTooth – 11 Bluetooth Bugs That Affected SoC Vendors Let Hackers to Crash The Device & Execute the Code Remotely

SweynTooth – 11 Bluetooth Bugs That Affected SoC Vendors Let Hackers to Crash The...

A group of security researchers uncovered a 12 Bluetooth based vulnerabilities dubbed "SweynTooth" in BLE software development kits of seven major system-on-a-chip...
Bluetooth Vulnerability

New Bluetooth Vulnerability in Android Let Remote Attackers Execute Arbitrary Code & Silently Take...

A new critical Bluetooth vulnerability discovered in Android Bluetooth system that allows remote attackers silently execute arbitrary code remotely and take the...
New Bluetooth Vulnerability Allow Hackers to Intercept The Encrypted Traffic & Spy on the Devices

New Bluetooth Vulnerability Allow Hackers to Intercept The Encrypted Traffic & Spy on the...

Researchers discovered a severe privilege escalation vulnerability in Bluetooth let unauthenticated attackers intercept and monitor the encryption traffic between two paired...

BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of BLE embedded devices that...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security