Bluetooth

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited…

1 year ago

Critical Bluetooth BIAS Attack Let Hackers Access Billions of Devices

A new attack dubbed Bluetooth BIAS attack allows attackers to spoof the already paired device and to successfully authenticate without…

5 years ago

SweynTooth – 11 Bluetooth Bugs That Affected SoC Vendors Let Hackers to Crash The Device & Execute the Code Remotely

A group of security researchers uncovered a 12 Bluetooth based vulnerabilities dubbed "SweynTooth" in BLE software development kits of seven…

5 years ago

New Bluetooth Vulnerability in Android Let Remote Attackers Execute Arbitrary Code & Silently Take Your Device Control

A new critical Bluetooth vulnerability discovered in Android Bluetooth system that allows remote attackers silently execute arbitrary code remotely and…

5 years ago

New Bluetooth Vulnerability Allow Hackers to Intercept The Encrypted Traffic & Spy on the Devices

Researchers discovered a severe privilege escalation vulnerability in Bluetooth let unauthenticated attackers intercept and monitor the encryption traffic between two…

5 years ago

BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices

Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy)  is named as " BLEEDINGBIT " affected millions of…

6 years ago

2 Billion Bluetooth Devices are Still Vulnerable to Dangerous BlueBorne Attack After 1 Year

A recent report revealed that more than 2 Billion Bluetooth Devices are still vulnerable to BlueBorne Attack even after 1…

6 years ago

Btlejacking Attack Could Allow a Hacker to Jam and Takeover the Bluetooth Connection

The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected…

6 years ago

Critical BlueBorne Vulnerability Impacts Around 20 Million Google Home and Amazon Echo Devices

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short-range connectivity in the vast…

7 years ago

Exploit Released for Critical BlueBorne Vulnerability that Reveals Nearly All Connected Device

Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if…

7 years ago