Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands

Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. Continue reading Billions of Devices at Risk of Hacking & Impersonation Due to Hidden Commands

BSAM: Open-source methodology for Bluetooth security assessment

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of… Continue reading BSAM: Open-source methodology for Bluetooth security assessment