Critical vulnerability in Bluetooth Low Energy (BLE) allows easily hacking Tesla cars, smart locks and millions of devices that use this Bluetooth technology

Specialists from the security firm NCC Group developed a tool capable of deploying relay attacks against Bluetooth Low Energy (BLE), which would allow bypassing any existing protection in the target system, authenticating without any problem. This technology is used in all kinds of products, including smartphones, laptops, access control systems, and even in Tesla Model […]

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks. “Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing,” the Carnegie […]

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out man-in-the-middle (MitM) attacks. “Devices supporting the Bluetooth Core and Mesh Specifications are vulnerable to impersonation attacks and AuthValue disclosure that could allow an attacker to impersonate a legitimate device during pairing,” the Carnegie […]

Zero-click Linux Bluetooth vulnerability allows taking control remotely without even user clicking a link

After months of research and rumors, the technical details of BleedingTooth, a zero-click attack on the Linux Bluetooth subsystem that would have allowed unauthenticated threat actors to execute arbitrary code with kernel privileges, have finally been revealed. BleedingTooth are actually three flaws found in BlueZ, the official Linux Bluetooth protocol stack available on any computer […]

RadareEye – Scan Nearby devices [BLE, Bluetooth And Wifi]

  A tool made for specially scanning nearby devices[BLE,Bluetooth & Wifi] and execute our given command on our system when the target device comes in between range.   NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. Use it for Learning purpose only. Installation of RadareEye : git […]

How to use headphones or Bluetooth to hack and take control of any Android device

A recent research published by vulnerability testing specialists from Purdue University details a new exploit that abuses some Android operating system smartphones through the use of malicious peripheral devices (specifically through Bluetooth and USB). The application processor of almost any relatively recent smartphone model uses the AT Command Interface to launch high-level commands to the […]

Sparrow-Wifi – Next-Gen GUI-based WiFi And Bluetooth Analyzer For Linux

Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux. In its most comprehensive use cases, sparrow-wifi integrates wifi, software-defined radio […]

Turn off your Bluetooth. Experts discover new Bluetooth KNOB vulnerability

A group of vulnerability testing researchers has revealed a new method to break Bluetooth’s encryption key negotiation protocol; the attack, dubbed ‘Key Negotiation of Bluetooth’ (KNOB) is possible on any device that supports the Bluetooth protocol and has required an early response from Google security teams for correction. Researchers Kasper Rasmussen and Daniele Antonioli, from […]

New Bluetooth vulnerability allows hacking iOS and Android devices

Wireless protocols are not exempt from cybersecurity risks. IT security audit specialists say that more than one billion Bluetooth-enabled devices (smartphones, IoT equipment, laptops, switches, and others) present a critical vulnerability that, if exploited, would allow hackers to intercept transmitted data between two connected devices, especially smartphones. Tracked as CVE-2019-9506, this vulnerability is present in […]

New Bluetooth Vulnerability Lets Attackers Spy On Encrypted Connections

Over a billion Bluetooth-enabled devices, including smartphones, laptops, smart IoT devices, and industrial devices, have been found vulnerable to a high severity vulnerability that could allow attackers to spy on data transmitted between the two devices. The vulnerability, assigned as CVE-2019-9506, resides in the way ‘encryption key negotiation protocol’ lets two Bluetooth BR/EDR devices choose […]

First Millimeter-sized Bluetooth Chip Invented To Send Low-Energy Data Packets

We are surrounded by Bluetooth radio signals and most of the devices that we see around — smartphones, wireless computer networks, and wireless earbuds — use Bluetooth transmitters for transmitting signals. However, contemporary transmitters have two problems: heavy power consumption which is why Bluetooth earbuds usually have a talk time of just 4 to 5 hours, […]

Mi Sports Bluetooth Earphones Basic Review: Portability Meets Decent Performance

Apart from offering the amazingly-priced smartphones with an amazingly-prepared spec sheet, Xiaomi also competes in the audio accessory arena. Among the various affordable options it provides us with, the company has recently unveiled the Mi Sports Bluetooth Earphones Basic, priced at just Rs 1,499. As Bluetooth-enabled earphones are popular enough to become an apparent music […]

Never Lose Your Wallet Again With Orbit Bluetooth Tracker

For someone like me who frequently taps the pocket to reassure that I still have my wallet, a Bluetooth tracker is a life-saving device. However, most Bluetooth trackers that I have come across are difficult to carry in a wallet. Of course, I don’t want an awkward bulge from a Bluetooth tracker device in my […]

Intel Discovers And Publishes New Bluetooth Vulnerability

Turns out, Intel has now discovered and published a new Bluetooth vulnerability, which could help intercept and manipulate transmissions between two compatible devices. The reports say that the newly discovered vulnerability has the potential to allow cybercriminals to intercept transmissions between two affected Bluetooth-compatible devices and also to relay malicious signals back and forth between […]

Bluetooth hack affecting millions of devices from several vendors

Another Bluetooth attack technique has been disclosed Specialists in enterprise data protection services have found a highly critical vulnerability that affects some Bluetooth implementations that could allow a not authenticated attacker in physical proximity of specific devices intercept, control or manipulate exchanged traffic. Identified as CVE-2018-5383, the vulnerability affects the firmware or operating system software drivers of several […]

Update your devices: New Bluetooth flaw lets attackers monitor traffic

The Bluetooth flaw also opens door to a man-in-the-middle attack. The IT security researchers at Israel Institute of Technology have discovered a critical security vulnerability in some implementations of the Bluetooth standard in which not all the parameters involved are appropriately validated by the cryptographic algorithm. If the vulnerability is exploited it can allow a remote attacker within the range of […]