Security News

The Bluetooth Special Interest Group (SIG) revealed a new direction finding feature that holds the potential to enhance the performance of Bluetooth location services solutions. The new feature...

Yeah, we've patched that one, adds Cisco Texas Instruments has rather feebly slapped down infosec researchers' findings on a so-called Bleedingbit Bluetooth Low Energy vulnerability after a more...

Internet of Things (IoT) applications and solutions using Bluetooth sensors now have a path from device to the cloud with little to no coding required. Rigado’s Cascade IoT Gateway has integrated...

People who have synced their mobile phones with a wide variety of vehicle infotainment systems may have have their personal information exposed to a new type of vehicle hack, security researchers...

Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises...

Millions of access points and other networking devices used by enterprises around the world may be exposed to remote attacks due to a couple of vulnerabilities discovered by researchers in...

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control system architecture involves the...

Bluetooth has a serious security vulnerability: In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote...

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and to monitor and fiddle...

A high-severity flaw could result in attackers intercepting information, elevation of privilege and/or denial of service.