bluetooth
Tracking People via Bluetooth on Their Phones
We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...
‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth
Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.” ...
Tracking People by their MAC Addresses
Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones. The good news is that product vendors are fixing this: Several ...
Security Analysis of Apple’s “Find My…” Protocol
Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“: Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking ...
Hacking Christmas Gifts: Brushing with Bluetooth
If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
BleedingTooth: Intel Discloses Early, Angering Linux Lovers
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
New Bluetooth Vulnerability
There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered ...
Bridgefy FAIL: Insecure for Use in Protests
Bridgefy, a young naïve startup, built an app for use-case A. But many people used it for use-case B, which needs a radically stronger security posture ...
Towards a Universal Security Solution against Bluetooth Low Energy Attacks
For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and ...
Bluetooth Vulnerability: BIAS
This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...