Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Bluetooth

What is Bluebugging and how do hackers use it? Learn how to secure your devices

30 November 2022

Bluebugging is a process of hacking through which hackers can gain access to devices with discoverable Bluetooth connections. Following …

Tags Bluetooth, Cyber Threats, Hacking, How-To, IT

Apple iOS and macOS Flaw Could’ve Let Apps Eavesdrop on Your Conversations with Siri

27 October 2022

A now-patched security flaw in Apple’s iOS and macOS operating systems could have potentially enabled apps with Bluetooth access to …

Tags Apple Siri, Apps, Bluetooth, Conversations, Flaws

Google Patches Critical Android Bluetooth Flaw in August Security Bulletin

2 August 2022

Google published its monthly security bulletin for August on Monday, detailing the latest available patches for Android. A total of 37 …

Tags Android, Bluetooth, Critical, Flaws, Mobile Development

Researchers Find Bluetooth Signals Can be Fingerprinted to Track Smartphones

10 June 2022

A new research undertaken by a group of academics from the University of California San Diego has revealed for the first time that …

Tags Bluetooth, IT, News, Privacy

You can be tracked via your Bluetooth signal, researchers claim

10 June 2022

Boffins at the University of California San Diego have found a way to track individuals via Bluetooth. Researchers discovered that the …

Tags Bluetooth, IT, Privacy, Tracking, You

Hardware flaws give Bluetooth chipsets unique fingerprints that can be tracked

10 June 2022

Researchers at the University of California San Diego have shown for the first time that Bluetooth signals each have an individual, …

Tags Bluetooth, IT, News

Pentester pops open Tesla Model 3 using low-cost Bluetooth module

17 May 2022

Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be fooled by a new form of relay …

Tags Bluetooth, IT, News, Tesla Model 3

Issue in digital COVID-19 test could have allowed individuals to falsify results

22 April 2022

WithSecure and Cue Health have worked together to address a security issue that WithSecure discovered in Cue’s COVID-19 test, which …

Tags Bluetooth, COVID-19, Issues, IT, News

Smashing Security podcast #266: Dick pics, secret spies, and Kaspersky

17 March 2022

Germany tells consumers to stop using Kaspersky anti-virus products, OSINT reveals a secret government department (with help from an Apple …

Tags AirTag, Apple, Bluetooth, Eugene Kaspersky, Germany

Fisher Price’s Bluetooth reboot of pre-school play phone has adult privacy flaw

23 December 2021

A Bluetooth phone designed to evoke the carefree days of early childhood has been found to instead threaten the very adult prospect of …

Tags Bluetooth, IT, News

Researchers Share New Attacks on Wi-Fi and Bluetooth Chips

13 December 2021

Researchers have revealed new attacks that can exploit shared resources between Wi-Fi and Bluetooth components on a variety of …

Tags Bluetooth, IT, News

Bugs in billions of WiFi, Bluetooth chips allow password, data theft

13 December 2021

Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves it’s …

Tags Bluetooth, Bugs, IT, Mobile, News

BrakTooth Proof of Concept Tool Demonstrates Bluetooth Vulnerabilities

4 November 2021

On November 1, 2021, researchers publicly released a BrakTooth proof-of-concept (PoC) tool to test Bluetooth-enabled devices against …

Tags Bluetooth, Concept, Security Pro, Tools, Vulnerability

How your phone, laptop, or watch can be tracked by their Bluetooth transmissions

22 October 2021

Over the past few years, mobile devices have become increasingly chatty over the Bluetooth Low Energy (BLE) protocol and this turns out to …

Tags Bluetooth, How, IT, News
Older posts
Page1 Page2 … Page18 Next →
Cookie-Free

NVD

  • CVE-2023-25168 – Wings is Pterodactyl’s server control plane. This vulnerability can be used to delete file …9 February 2023
  • CVE-2022-40480 – Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain a …8 February 2023
  • CVE-2023-0718 – The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a mis …8 February 2023
  • CVE-2023-24828 – Onedev is a self-hosted Git Server with CI/CD and Kanban. In versions prior to 7.9.12 the …8 February 2023
  • CVE-2022-45192 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023
  • CVE-2022-45190 – An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio ran …8 February 2023

EXPLOITS

  • Feehi CMS 2.1.1 – Remote Code Execution (Authenticated)22 November 2022
  • SmartRG Router SR510n 2.6.13 – Remote Code Execution22 November 2022
  • CVAT 2.0 – Server Side Request Forgery18 November 2022
  • MSNSwitch Firmware MNT.2408 – Remote Code Execution18 November 2022
  • Open Web Analytics 1.7.3 – Remote Code Execution18 November 2022
  • IOTransfer V4 – Unquoted Service Path11 November 2022

SECURELIST

  • Web beacons on websites and in e-mail7 February 2023
  • Prilex modification now targeting contactless credit card transactions31 January 2023
  • Come to the dark side: hunting IT professionals on the dark web30 January 2023
  • What your SOC will be facing in 202323 January 2023
  • Roaming Mantis implements new DNS changer in its malicious mobile app in 202219 January 2023
  • What threatens corporations in 2023: media blackmail, fake leaks and cloud attacks18 January 2023
Copyright © 2023 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »