Security News

Millions of access points and other networking devices used by enterprises around the world may be exposed to remote attacks due to a couple of vulnerabilities discovered by researchers in...

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control system architecture involves the...

Bluetooth has a serious security vulnerability: In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote...

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and to monitor and fiddle...

A high-severity flaw could result in attackers intercepting information, elevation of privilege and/or denial of service.

Patches incoming for Bluetooth bug that could affected Apple, Intel, Broadcom, and some Android devices.

A "Bluetooth snooping" bug, dubbed CVE-2018-5383, was just announced - are you patched, and how can you tell?

Yet another bluetooth hacking technique has been uncovered. A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an...

A high severity vulnerability affecting some Bluetooth implementations can allow an attacker in physical proximity of two targeted devices to monitor and manipulate the traffic they exchange. Some...

Crypto blunder lets middle-person spy on connections after snooping on pairing With a bunch of security fixes announced and more on the way, details had been made public of a Bluetooth bug that...