Bluetooth

We talk about all the newest information about Bluetooth technology here, such as new standards, gadgets, and inventions. We look at how Bluetooth is changing in areas like audio, the Internet of Things (IoT), and connectivity options. We also talk about industry trends and new developments. Keep up with how Bluetooth is changing the future of wireless connectivity and how devices can talk to each other.

New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing

A recently discovered vulnerability in Bluetooth technology has raised significant security concerns. This flaw could allow hackers to intercept passcodes…

4 weeks ago

BLUFFS: Six New Attacks that Break Secrecy of Bluetooth Sessions

Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…

11 months ago

BRAKTOOTH – New Bluetooth Bugs Let Hackers Perform ACE & DoS Attack On Millions of Devices

Recently, the Singapore University of Technology and Design has published details of more than a dozen vulnerabilities in the Bluetooth…

3 years ago

7 New Bugs in Bluetooth Let Hackers Impersonate As Legitimate Device & Launch DDoS Attacks

Bluetooth is currently used in millions of devices, and the Carnegie Mellon CERT Coordination Center (CERT/CC) has recently reported 7…

3 years ago

SweynTooth – 11 Bluetooth Bugs That Affected SoC Vendors Let Hackers to Crash The Device & Execute the Code Remotely

A group of security researchers uncovered a 12 Bluetooth based vulnerabilities dubbed "SweynTooth" in BLE software development kits of seven…

5 years ago

New Bluetooth Vulnerability in Android Let Remote Attackers Execute Arbitrary Code & Silently Take Your Device Control

A new critical Bluetooth vulnerability discovered in Android Bluetooth system that allows remote attackers silently execute arbitrary code remotely and…

5 years ago

New Bluetooth Vulnerability Allow Hackers to Intercept The Encrypted Traffic & Spy on the Devices

Researchers discovered a severe privilege escalation vulnerability in Bluetooth let unauthenticated attackers intercept and monitor the encryption traffic between two…

5 years ago

BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of…

6 years ago