Bluetooth Vulnerability

Critical Bluetooth BIAS Attack Let Hackers Access Billions of Devices

A new attack dubbed Bluetooth BIAS attack allows attackers to spoof the already paired device and to successfully authenticate without…

4 years ago

New Bluetooth Vulnerability in Android Let Remote Attackers Execute Arbitrary Code & Silently Take Your Device Control

A new critical Bluetooth vulnerability discovered in Android Bluetooth system that allows remote attackers silently execute arbitrary code remotely and…

5 years ago

Metasploit Released Public Exploit Module for BlueKeep RCE Vulnerability in Remote Desktop Protocol

Metasploit published a public exploit for BlueKeep, the exploit module targets 64-bit versions of Windows 7 and Windows 2008 R2.…

5 years ago

New Bluetooth Vulnerability Allow Hackers to Intercept The Encrypted Traffic & Spy on the Devices

Researchers discovered a severe privilege escalation vulnerability in Bluetooth let unauthenticated attackers intercept and monitor the encryption traffic between two…

5 years ago

Btlejacking Attack Could Allow a Hacker to Jam and Takeover the Bluetooth Connection

The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected…

6 years ago

New Bluetooth Vulnerability Affected Millions of Devices that Allow Hackers to Steal the Encryption key

Newly discovered Bluetooth vulnerability in implemented firmware and operating system software drivers allows remote attackers could obtain the encryption key used by…

6 years ago