searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

Bluetooth

Get our top stories in your inbox

ADTRAN IoT Gateway based on LoRaWAN technology supports Smart Building applications

April 22, 2021

ADTRAN announced its Internet of Things (IoT) Gateway based on LoRaWAN technology. This micro-sized, Bluetooth-enabled gateway will enable LoRaWAN network operators, service …

CCC Digital Key Release 3.0 enables consumers to use their mobile device as a digital key hands-free

April 22, 2021

The Car Connectivity Consortium (CCC) announced that its Digital Key Release 3.0 specification – which adds Bluetooth Low Energy and Ultra Wideband (UWB) wireless connectivity …

Encrypted method that measures encounters could slow down or prevent future pandemics

April 2, 2021

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …

Kali Linux 2020.3 released: A new shell and a Bluetooth Arsenal for NetHunter

August 19, 2020

Offensive Security has released Kali Linux 2020.3, the latest iteration of the popular open source penetration testing platform. You can download it or upgrade to it. Kali …

Number of active IoT devices expected to reach 24.1 billion in 2030

May 22, 2020

At the end of 2019 there were 7.6 billion active IoT devices, a figure which will grow to 24.1 billion in 2030, a CAGR of 11%, according to a research published by Transforma …

First international smart home standard ensures secure connectivity between devices

January 6, 2020

The Open Connectivity Foundation (OCF) announced that products from BSC Computer GmbH, COMMAX, Haier, LG Electronics, Resideo, Samsung Electronics and SURE Universal will …

SoniTalk: A new method for near-field communication

November 27, 2019

The technology is available for free and – contrary to similar technologies – focuses on security and data protection. In this way, SoniTalk leaves it up to the …

The way Bluetooth devices ‘talk’ to apps leaves them vulnerable

November 19, 2019

Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Where is the issue? The problem lies in …

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

August 16, 2019

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic …

AWDL flaws open Apple users to tracking, MitM, malware planting

July 31, 2019

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

Google offers free replacement for buggy Titan Security Keys

May 16, 2019

Misconfigured Bluetooth pairing protocols in Google’s Titan Security Keys may allow attackers to communicate with users’ security key or with the device their key …

Employee cybersecurity essentials part 2: Lost devices and unsafe connections

April 16, 2019

Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …

Posts navigation

1 2 3 4

Featured news

  • Overcoming obstacles to introduce zero-trust security in established systems
  • Leveraging network automation to enhance network security
  • Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)
Guide: Aligning your security program with the NIST CSF

Sponsored

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

How to scale cybersecurity for your business

Don't miss

Overcoming obstacles to introduce zero-trust security in established systems

Leveraging network automation to enhance network security

Ransomware gangs are exploiting IBM Aspera Faspex RCE flaw (CVE-2022-47986)

3CX customers targeted via trojanized desktop app

The rise of biometrics and decentralized identity is a game-changer for identity verification

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us