At the end of 2019 there were 7.6 billion active IoT devices, a figure which will grow to 24.1 billion in 2030, a CAGR of 11%, according to a research published by Transforma Insights. Short range technologies, such as Wi-Fi, Bluetooth and Zigbee, will… Continue reading Number of active IoT devices expected to reach 24.1 billion in 2030
Apple’s efforts to overcome the limitations of Bluetooth is a proprietary system called MagicPairing, but there are flaws in the magic. Continue reading Apple “MagicPairing” for AirPods – the magic isn’t perfect yet
A host of unpatched security bugs that allow BIAS attacks affects Bluetooth chips from Apple, Intel, Qualcomm, Samsung and others. Continue reading Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices
I received a parcel from Amazon which I did not order, addressed to me. It contained Bluetooth earphones. It may just be part of a brushing scam, but it’s got me curious.
So my question is.. Could a Bluetooth device be disguised as earpho… Continue reading Can Bluetooth "headphones" be malicious?
From time to time, I see this dialog box pop up on my MacBook Pro screen. It typically happens as the computer wakes up from sleep.
Magic keyboard is trying to connect using an unsecured Bluetooth connection. Unsecured Bluetooth acc… Continue reading Apple bluetooth keyboard insecure connection?
In the context of contact tracing, I have a privacy question.
I have read a few (and “few” is already a bad thing) articles about Bluetooth contact tracing, especially in the context of the Sars-Cov2 pandemic. There are huge privacy conce… Continue reading Anonimity of Bluetooth tokens
Orange Amplification has been in the audio business for over 50 years, helping to throw out sounds from likes of Jimmy Page, John McVie, Jim Root, Billy Gibbons, Orianthi and Glenn Hughes along the way. The brand makes ear candy too, and has now launch… Continue reading Orange rides the wireless wave with the Crest Edition BT headphones
I have my custom made Android app which is connecting to my BLE controller. I want to prove that BLE is secured from passive eavesdropping. I have Adafruit Bluefruit BLE Sniffer and Wireshark. I can see packets transfered from Master to Sl… Continue reading BLE pairing method with Passkey entry – is it possible to sniff passkey value?
Sophos firewall appliances are actively being attacked by a 0-day exploit chain that originates with a SQL injection. That injection is a nasty one, as it can be launched from the WAN user portal. The observed attack used that vulnerability to inject a shell command into the device database, where …read more
I was quoted in BuzzFeed: "My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier, a privacy expert and fellow at the Berkman Klein Center for Internet & Society at Harvard University, told BuzzFeed News… Continue reading Me on COVAD-19 Contact Tracing Apps