Wireless vulnerabilities are doubling every few years

Wireless vulnerabilities are being disclosed at a rate that has no precedent in the fifteen-year history of systematic tracking. In 2025, researchers published 937 new wireless-related CVEs, an average of 2.5 per day, according to a threat report from … Continue reading Wireless vulnerabilities are doubling every few years

Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol

It’s hard to deny that label printers have become more accessible than ever, but an annoying aspect of many of these cheap units is that their only user interface is …read more Continue reading Reverse-Engineering the Bluetooth Fichero Thermal Label Printer Protocol

Android app uses Bluetooth signals to detect nearby smart glasses

Smart glasses with built-in cameras are showing up in more public spaces, and a growing number of people want a way to know when one is nearby. An Android app called Nearby Glasses, developed by Yves Jeanrenaud, attempts to fill that gap by scanning Bl… Continue reading Android app uses Bluetooth signals to detect nearby smart glasses

Apple updates AirTag with expanded range and improved findability

Apple has released a new version of its AirTag tracking accessory that extends its connectivity range and improves how items are located. The updated AirTag uses a second-generation Ultra Wideband chip, similar to the chip in the iPhone 17 lineup, to i… Continue reading Apple updates AirTag with expanded range and improved findability

Smashing Security podcast #451: I hacked the government, and your headphones are next

In episode 451 of “Smashing Security,” we meet the cybercriminal who hacked the US Supreme Court, Veterans Affairs, and more – and then helpfully posted screenshots (and even someone’s blood type) on an account called “I hacked the government.”

Plus w… Continue reading Smashing Security podcast #451: I hacked the government, and your headphones are next

WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking

The critical issue impacts Bluetooth audio accessories with improper Google Fast Pair implementations.
The post WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking appeared first on SecurityWeek.
Continue reading WhisperPair Attack Leaves Millions of Audio Accessories Open to Hijacking

Comparison between Just Works and a static "123456" Passkey in BLE Simple Secure Pairing?

Change Your BLE Passkey Like You Change Your Underwear describes the issues with using a static Passkey, but I would like to know how these risks/vulnerabilities compare to the Just Works scheme; i.e. is a static passkey of "123456&qu… Continue reading Comparison between Just Works and a static "123456" Passkey in BLE Simple Secure Pairing?