Bluetooth Vulnerabilities

A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty. BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and… Continue reading Bluetooth Vulnerabilities

Fidget Spinner Gets Useful as MIDI Controller

Fidget spinners are not only a fad, but pretty much useless. Sounds like a job for hacking to make the toys have some actual purpose. [D777k] took up the challenge and created a MIDI controller from a common spinner. You can see a video of the results, below.

The device uses a LightBlue Bean controller and Garage Band as the MIDI software. Granted, it might not be super useful, but it is better than just a plain old spinner. [D777k] calls it a “whirling dervish of sound making!

The Arduino code that drives the thing is very simple. It reads …read more

Continue reading Fidget Spinner Gets Useful as MIDI Controller

Why is Bluetooth Using Cellular Data when it is turned off?

I reset the Cellular data statistics on my iPhone 6 yesterday and went to Settings > Cellular > System Services. I noticed that Bluetooth had used 3.3 KB of Cellular data. A few hours later, I noticed it had used 3.5 KB of data. While this isn’t a lot, why is Bluetooth using any at all? If Bluetooth is off, shouldn’t it be using no Cellular data at all?

Any info would be greatly appreciated.

Thank you

Continue reading Why is Bluetooth Using Cellular Data when it is turned off?

Bluetooth Vulnerability Affects All Major OS

Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is: Bluetooth turned on. No user interaction is necessary to successfully exploit the flaws, the attacker does not need to pair with a target device nor the target device must be paired with some other device.

The research paper, dubbed BlueBorne (what’s a vulnerability, or a bunch, without a cool name nowadays?), details each vulnerability and how it was …read more

Continue reading Bluetooth Vulnerability Affects All Major OS

Patch Tuesday: 80+ vulnerabilities fixed, one exploited in the wild

As part of its regular, monthly Patch Tuesday update, Microsoft has released patches for 81 new vulnerabilities, including a zero-day in the .NET Framework. The September patch dump also includes details of a spoofing vulnerability in the Windows Bluetooth driver (CVE-2017-8628), which has been disclosed as part of the BlueBorne batch of vulnerabilities. The flaw was apparently patched silently in July, but Microsoft chose to delay releasing details about it until other vendors could develop … More Continue reading Patch Tuesday: 80+ vulnerabilities fixed, one exploited in the wild

Microsoft Patches 85 Flaws, One Allowed FinFisher Spyware Installation

By Waqas
Microsoft Releases Patch for Dangerous .NET Vulnerability in Latest Security
This is a post from HackRead.com Read the original post: Microsoft Patches 85 Flaws, One Allowed FinFisher Spyware Installation
Continue reading Microsoft Patches 85 Flaws, One Allowed FinFisher Spyware Installation

Billions of Bluetooth-enabled devices vulnerable to new airborne attacks

Eight zero-day vulnerabilities affecting the Android, Windows, Linux and iOS implementations of Bluetooth can be exploited by attackers to extract information from, execute malicious code on, or perform a MitM attack against vulnerable devices. The vulnerabilities, collectively dubbed BlueBorne by the researchers who discovered them, can be exploited without users having to click on a link or download a questionable file – in fact, no action by the user is required to perform the attack. … More Continue reading Billions of Bluetooth-enabled devices vulnerable to new airborne attacks

Can a compromised car stereo spread vulnerability to a connected phone via bluetooth

I have an older cheapo JVC car stereo with bluetooth. I used an app to check for Blueborne vulnerability (“Blueborne Vulnerability Scanner,” no longer available) which said the stereo was high risk. It is very unlikely to g… Continue reading Can a compromised car stereo spread vulnerability to a connected phone via bluetooth

BlueBorne Bluetooth Flaw Affects Millions of Smartphones, IoT and PCs

By Waqas
A Palo Alto based Internet of Things (IoT) security company
This is a post from HackRead.com Read the original post: BlueBorne Bluetooth Flaw Affects Millions of Smartphones, IoT and PCs
Continue reading BlueBorne Bluetooth Flaw Affects Millions of Smartphones, IoT and PCs