Crosstalk Flaw: Hackers can steal sensitive data with unsecure USBs

By Waqas

University of Adelaide School of Computer Science’ research team led

This is a post from HackRead.com Read the original post: Crosstalk Flaw: Hackers can steal sensitive data with unsecure USBs

Continue reading Crosstalk Flaw: Hackers can steal sensitive data with unsecure USBs

Hacking a Segway

The Segway has a mobile app. It is hackable: While analyzing the communication between the app and the Segway scooter itself, Kilbride noticed that a user PIN number meant to protect the Bluetooth communication from unauthorized access wasn’t being used for authentication at every level of the system. As a result, Kilbride could send arbitrary commands to the scooter without… Continue reading Hacking a Segway

Bluetooth now supports mesh networking, ideally suited for building automation

The Bluetooth Special Interest Group (SIG) announced today that Bluetooth technology now supports mesh networking. The new mesh capability enables many-to-many (m:m) device communications and is optimized for creating large-scale device networks. It is ideally suited for building automation, sensor networks and other IoT solutions where tens, hundreds, or thousands of devices need to reliably and securely communicate with one another. Industrial-grade solution Commercial building and factory automation represent major market opportunities for wireless mesh … More Continue reading Bluetooth now supports mesh networking, ideally suited for building automation

Hackaday Prize Entry: Dongle For A Headless Pi

Mass production means that there’s a lot of great hardware out there for dirt cheap. But it also means that the manufacturer isn’t going to spend years working on the firmware to squeeze every last feature out of it. Nope, that’s up to us.

[deqing] took a Bluetooth Low Energy / USB dongle and re-vamped the firmware to turn it into a remote keyboard and mouse, and then wrote a phone app to control it. The result? Plug the USB dongle in, and the computer thinks it sees a keyboard and mouse. Connect the phone via BLE, and you’re typing …read more

Continue reading Hackaday Prize Entry: Dongle For A Headless Pi

Three Thumbs, Way, Way Up!

At least one in their lives — or several times a day — everyone has wished they had a third hand to help them with a given task. Adding a mechanical extra arm to one’s outfit is a big step, so it might make sense to smart small, and first add an extra thumb to your hand.

This is not a prosthetic in the traditional sense, but a wearable human augmentation envisioned by [Dani Clode], a master’s student at London’s Royal College of Art. The thumb is 3D-printed out of Ninjaflex and mounted to a printed brace which slides over …read more

Continue reading Three Thumbs, Way, Way Up!

Does a "Barge-in Attack" exist for unencrypted Bluetooth Low Energy connections?

Does what I’m calling a “barge-in attack” exist for Bluetooth Low Energy? This is a type of Man-in-the-Middle attack, I guess, but unlike in most discourse on BLE security, the attacker does not create two connections, one wi… Continue reading Does a "Barge-in Attack" exist for unencrypted Bluetooth Low Energy connections?