Check Your Mailbox Using The AirTag Infrastructure

A small round NRF51822 board glued to the underside of a mailbox lid, with a small vibration sensor attached

When a company creates an infrastructure of devices, we sometimes subvert this infrastructure and use it to solve tricky problems. For example, here’s a question that many a hacker has …read more Continue reading Check Your Mailbox Using The AirTag Infrastructure

Bluetooth Flaw Allows Remote Unlocking of Digital Locks

Locks that use Bluetooth Low Energy to authenticate keys are vulnerable to remote unlocking. The research focused on Teslas, but the exploit is generalizable.

In a video shared with Reuters, NCC Group researcher Sultan Qasim Khan was able to open and then drive a Tesla using a small relay device attached to a laptop which bridged a large gap between the Tesla and the Tesla owner’s phone.

“This proves that any product relying on a trusted BLE connection is vulnerable to attacks even from the other side of the world,” the UK-based firm said in a statement, referring to the Bluetooth Low Energy (BLE) protocol—technology used in millions of cars and smart locks which automatically open when in close proximity to an authorised device…

Continue reading Bluetooth Flaw Allows Remote Unlocking of Digital Locks

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

By Deeba Ahmed
Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect…
This is a post from HackRead.com Read the original post: Attackers Can Unlock Tesla Cars and Smart… Continue reading Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

By Deeba Ahmed
Research reveals that cars, homes, and personal data of those depending on Bluetooth proximity authentication mechanisms to protect…
This is a post from HackRead.com Read the original post: Attackers Can Unlock Tesla Cars and Smart… Continue reading Attackers Can Unlock Tesla Cars and Smart Devices by Exploiting Bluetooth Flaws

iPhone Malware that Operates Even When the Phone Is Turned Off

Researchers have demonstrated iPhone malware that works even when the phone is fully shut down.

t turns out that the iPhone’s Bluetooth chip­ — which is key to making features like Find My work­ — has no mechanism for digitally signing or even encrypting the firmware it runs. Academics at Germany’s Technical University of Darmstadt figured out how to exploit this lack of hardening to run malicious firmware that allows the attacker to track the phone’s location or run new features when the device is turned off.

[…]

The research is the first — or at least among the first — to study the risk posed by chips running in low-power mode. Not to be confused with iOS’s low-power mode for conserving battery life, the low-power mode (LPM) in this research allows chips responsible for near-field communication, ultra wideband, and Bluetooth to run in a special mode that can remain on for 24 hours after a device is turned off…

Continue reading iPhone Malware that Operates Even When the Phone Is Turned Off