BSAM: Open-source methodology for Bluetooth security assessment

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of… Continue reading BSAM: Open-source methodology for Bluetooth security assessment

2022 Hackaday Prize: Sensible Flow Helps You Keep Track of Your Water Usage

An infographic showing a tap with a sensor and a flow meter display

Safe, clean drinking water is a scarce resource that shouldn’t be wasted. But it’s not always easy to see how much you’re using when you turn on the tap: is …read more Continue reading 2022 Hackaday Prize: Sensible Flow Helps You Keep Track of Your Water Usage

Check Your Mailbox Using The AirTag Infrastructure

A small round NRF51822 board glued to the underside of a mailbox lid, with a small vibration sensor attached

When a company creates an infrastructure of devices, we sometimes subvert this infrastructure and use it to solve tricky problems. For example, here’s a question that many a hacker has …read more Continue reading Check Your Mailbox Using The AirTag Infrastructure

BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), residential smart locks, building access systems, mobile phones, laptops, and many o… Continue reading BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones

TapType: AI-Assisted Hand Motion Tracking Using Only Accelerometers

The team from the Sensing, Interaction & Perception Lab at ETH Zürich, Switzerland have come up with TapType, an interesting text input method that relies purely on a pair of …read more Continue reading TapType: AI-Assisted Hand Motion Tracking Using Only Accelerometers