New Bluetooth vulnerability can hack a phone in ten seconds

 Security company Armis has found a collection of eight exploits, collectively called Blueborne, that can allow an attacker access to your phone without touching it. The attack can allow access to both computers and phones as well as IoT devices. “Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth. These vulnerabilities are fully operational,… Read More Continue reading New Bluetooth vulnerability can hack a phone in ten seconds

VU#240311: Multiple Bluetooth implementation vulnerabilities affect many devices

A collection of Bluetooth implementation vulnerabilities known as"BlueBorne"has been released. These vulnerabilities collectively affect Windows,iOS,and Linux-kernel-based operating systems including Android and Tizen,and may in worst case allow an unauthenticated attacker to perform commands on the device. Continue reading VU#240311: Multiple Bluetooth implementation vulnerabilities affect many devices

BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices

A series of major Bluetooth-related security flaws allows attackers to take over devices, spy on data and networks, spread malware and successfully hack even airgapped targets. Victims don’t need to click on links, download malicious files or even be connected to the internet to be impacted. Billions of devices, including smartphones, connected TVs, laptops and watches are impacted. At least two billion such Android and Linux devices are deemed “unpatchable” and will remain vulnerable, according to researchers at Armis, the Israeli security firm where the issue was discovered in early 2017. The weakness is being called “BlueBorne” because it impacts nearly all devices with Bluetooth capabilities.  Google, Microsoft and Linux are expected to release patches and announcements on Tuesday to address and secure devices against BlueBorne. For Apple users, the issue has been fixed since iOS 10’s release in Sept. 2016. BlueBorne constitutes eight zero-day vulnerabilities, four of which are deemed critical. Beyond Tuesday, […]

The post BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices appeared first on Cyberscoop.

Continue reading BlueBorne: The latest Bluetooth vulnerability that impacts billions of devices

Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices

Bluetooth attack vector, dubbed ‘BlueBorne’, leaves billions of smart Bluetooth devices open to attack including Android and Apple phones and millions more Linux-based smart devices. Continue reading Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices

Turning On Your Amplifier With A Raspberry Pi

Life is good if you are a couch potato music enthusiast. Bluetooth audio allows the playing of all your music from your smartphone, and apps to control your hi-fi give you complete control over your listening experience.

Not quite so for [Daniel Landau] though. His Cambridge Audio amplifier isn’t quite the latest generation, and he didn’t possess a handy way to turn it on and off without resorting to its infrared remote control. It has a proprietary interface of some kind, but nothing wireless to which he could talk from his mobile device.

His solution is fairly straightforward, which in …read more

Continue reading Turning On Your Amplifier With A Raspberry Pi

Smashing Security #038: Gents! Stop airdropping your pics!

WannaCry hero Marcus Hutchins (aka MalwareTech) pleads not guilty to malware charges, the Scottish parliament is hit by a brute force attack, IoT smart locks aren’t so smart, and.. ahem.. someone is sending intimate pics via AirDrop to unsuspecting com… Continue reading Smashing Security #038: Gents! Stop airdropping your pics!

Hackaday Links: August 13, 2017

We found the most boring man on the Internet! HTTP Status Code 418 — “I’m a teapot” — was introduced as an April Fools Joke in 1998. Everyone had a good laugh, and some frameworks even implemented it. Now, the most boring man on the Internet and chairman of the IETF HTTP working group is trying to get 418 removed from Node and Go. There is an argument to removing code 418 from pieces of software — it gums up the works, and given only 100 code points for a client error, with 30 of them already used, we don’t …read more

Continue reading Hackaday Links: August 13, 2017

Hackaday Links: August 13, 2017

We found the most boring man on the Internet! HTTP Status Code 418 — “I’m a teapot” — was introduced as an April Fools Joke in 1998. Everyone had a good laugh, and some frameworks even implemented it. Now, the most boring man on the Internet and chairman of the IETF HTTP working group is trying to get 418 removed from Node and Go. There is an argument to removing code 418 from pieces of software — it gums up the works, and given only 100 code points for a client error, with 30 of them already used, we don’t …read more

Continue reading Hackaday Links: August 13, 2017