Screaming Channels Attack RF Security

As long as there has been radio, people have wanted to eavesdrop on radio transmissions. In many cases, it is just a hobby activity like listening to a scanner or monitoring a local repeater. But in some cases, it is spy agencies or cyberhackers. [Giovanni Camurati] and his colleagues have been working on a slightly different way to attack Bluetooth radio communications using a technique that could apply to other radio types, too. The attack relies on the ubiquitous use of mixed-signal ICs to make cheap radios like Bluetooth dongles. They call it “Screaming Channels” and — in a nutshell …read more

Continue reading Screaming Channels Attack RF Security

Managing Enterprise Security Risk on Vacation

Enterprise data and devices require additional safeguarding wherever your employee takes them — especially on vacation. Some basic user education can greatly reduce security risk.

The post Managing Enterprise Security Risk on Vacation appeared first on Security Intelligence.

Continue reading Managing Enterprise Security Risk on Vacation

Major Bluetooth Vulnerability

Bluetooth has a serious security vulnerability: In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote attacker within wireless range to inject an invalid public key to determine the session key with high probability. Such an attacker can then passively intercept and decrypt all device messages, and/or forge and… Continue reading Major Bluetooth Vulnerability

Update your devices: New Bluetooth flaw lets attackers monitor traffic

By Waqas
The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not al… Continue reading Update your devices: New Bluetooth flaw lets attackers monitor traffic

Bluetooth vulnerability allows snooping of traffic between paired devices

Researchers Eli Biham and Lior Neumann have discovered a vulnerability in two Bluetooth features that could be exploited by attackers to gain a man-in-the-middle position and to monitor and fiddle with the traffic between two devices connected via that… Continue reading Bluetooth vulnerability allows snooping of traffic between paired devices

Bluetooth Bug Allows Man-in-the-Middle Attacks on Phones, Laptops

A high-severity flaw could result in attackers intercepting information, elevation of privilege and/or denial of service. Continue reading Bluetooth Bug Allows Man-in-the-Middle Attacks on Phones, Laptops

CVE-2018-5383 Bluetooth Vulnerability Impacts Apple, Intel

Bluetooth exploits are not anything new on the hacking horizon but they can cause security risks to vulnerable devices. A new vulnerability, identified as CVE-2018-5383, fits the description of a great threat as it is a highly critical cryptographic fl… Continue reading CVE-2018-5383 Bluetooth Vulnerability Impacts Apple, Intel

VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange

Bluetooth firmware or operating system software drivers may not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange,which may allow a remote attacker to obtain the encryption key used by the device. Continue reading VU#304725: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange