If you are running Kali Linux and your Bluetooth is not working. Let’s fix that. It will be up and running in...
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses...
BtleJuice is a complete framework to perform Man-in-the-Middle attacks on Bluetooth Smart devices (also known as Bluetooth Low Energy). It is composed...
Bluepot was a third year university project attempting to implement a fully functional Bluetooth Honeypot. A piece of software designed to accept...
In this blog post, we will detail BlueSteal, or the ability to exploit multiple security failures in the Vaultek VT20i. These...
Don’t worry, these vulnerabilities have already been patched out. Back in September, Bluetooth-connected device owners got a little scare when security firm...
A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered...
Bluetooth technology is not a new thing but its starting to become very popular. Bluetooth is now seen in a lot of...
Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit VPN Gate auto-grabber Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!!...
Asecurity firm Armis has identified a set of 8 zero-day bugs, collectively known as BlueBorne, which put Bluetooth-capable devices at the risk...
A Palo Alto based Internet of Things (IoT) security company Armis has discovered critical vulnerabilities in Bluetooth that if exploited can allow...
Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority...
A fidget spinner is a toy device which in 2017 has become increasingly popular among teens and adults. It consists of a bearing...
A Node.js package for BLE (Bluetooth Low Energy) security assessment using Man-in-the-Middle and other attacks DOWNLOAD GATTACK http://www.gattack.io Install npm install gattacker...
We have already seen a massive growth in the connected-car technology market over the past few years, and it is going to...
Blooover is performing the Bluebug attack(Bluetooth sniffer Linux). Whilst you intend to install the software, you have to be using a phone...
Burglars can use a recently disclosed security flaw affecting several Google Nest cams to make vulnerable cameras go offline for approximately 60...
Last year Google found some critical security flaws in Microsoft’s Edge browser and urged the company to fix these flaws within nine...
If you use one, stop now. If you write heist movies, write safe-crackers out of your script. Attackers can locate and pop...
Bluetooth Low Energy devices like smart watches, “wearables,” give you up all day. My new neighbor was using AirDrop to move some files...
Sławomir Jasek with research firm SecuRing is sounding an alarm over the growing number of Bluetooth devices used for keyless entry and...