An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been discovered. This vulnerability can be exploited…
A new attack dubbed Bluetooth BIAS attack allows attackers to spoof the already paired device and to successfully authenticate without…
A group of security researchers uncovered a 12 Bluetooth based vulnerabilities dubbed "SweynTooth" in BLE software development kits of seven…
A new critical Bluetooth vulnerability discovered in Android Bluetooth system that allows remote attackers silently execute arbitrary code remotely and…
Researchers discovered a severe privilege escalation vulnerability in Bluetooth let unauthenticated attackers intercept and monitor the encryption traffic between two…
Researcher's discovered 2 critical Bluetooth vulnerabilities in BLE (Bluetooth Low Energy) is named as " BLEEDINGBIT " affected millions of…
A recent report revealed that more than 2 Billion Bluetooth Devices are still vulnerable to BlueBorne Attack even after 1…
The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected…
Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short-range connectivity in the vast…
Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if…