Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?

Why is step 4 needed? What does it protect in terms of security? Doesn’t the protection arrives from the last step so when Va and Vb (so called TK, Temporary Keys) are compared?
Other thing: I read somewhere that Cb is sent immediately an… Continue reading Why is the "intermediate" challenge needed in Bluetooth ECDH since the "real" verification is performed at the end with code comparison?

ASUS Releases Firmware Update for Critical Remote Authentication Bypass Affecting Seven Routers

A report from BleepingComputer notes that ASUS “has released a new firmware update that addresses a vulnerability impacting seven router models that allow remote attackers to log in to devices.” But there’s more bad news:

Taiwan’s CERT has also inform… Continue reading ASUS Releases Firmware Update for Critical Remote Authentication Bypass Affecting Seven Routers

Sonos puts personal home theater sound on your head with Ace debut

After years of bubbling online rumors, Sonos has finally revealed its first attempt to break into the overcrowded headphone market with the Ace wireless over-ears – which are clearly looking to dethrone the likes of Sony, Bose and Apple.Continue Readin… Continue reading Sonos puts personal home theater sound on your head with Ace debut

How to protect IP surveillance cameras from Wi-Fi jamming

Gone are the days of criminals cutting camera wires to evade detection: with the proliferation of affordable internet-connected cameras, burglars must resort to Wi-Fi jamming. Blocking the signal blinds the device and stalls home and business surveilla… Continue reading How to protect IP surveillance cameras from Wi-Fi jamming