Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Bluetooth
Billions of Bluetooth-enabled devices vulnerable to new airborne attacks

Eight zero-day vulnerabilities affecting the Android, Windows, Linux and iOS implementations of Bluetooth can be exploited by attackers to extract information from, execute …

Bluetooth mesh
Bluetooth now supports mesh networking, ideally suited for building automation

The Bluetooth Special Interest Group (SIG) announced today that Bluetooth technology now supports mesh networking. The new mesh capability enables many-to-many (m:m) device …

Nest Cam Outdoor
Burglars can easily make Google Nest security cameras stop recording

Google Nest’s Dropcam, Dropcam Pro, Nest Cam Outdoor and Nest Cam Indoor security cameras can be easily disabled by an attacker that’s in their Bluetooth range, a …

brain
CloudPets connected toys can be turned into remote surveillance devices

The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …

connections
How IoT initiatives impact the IT infrastructure

Internet of Things (IoT) infrastructure spending is making inroads into enterprise IT budgets across a diverse set of industry verticals. Improved business offerings, IoT data …

travel
Traveling on business? Beware of targeted spying on mobile

Corporate spying is a real threat in the world of cyber war. Employees traveling on behalf of their company could create opportunities for sophisticated adversaries to take …

Bluetooth
Fresh Bluetooth Developer Toolkit line tackles IoT security, interoperability

The Bluetooth Special Interest Group (SIG) released several updates to its developer toolkit line-up, which enables developers to build smarter when creating things like …

The dangers of connecting phones to connected cars

As smart, connected cars get more ubiquitous, they are often the only option you get when renting a car from a rental agency. With all the reports about car hacking, you might …

Pwnie Express
Pwnie Express open sources IoT and Bluetooth security tools

Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …

signal
Consumers willing to share personal info for a reward

Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …

Sniffing and tracking wearable tech and smartphones

Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …

Bluetooth vulnerabilities becoming easier to exploit

Codenomicon warns consumers about the poor quality and security of Bluetooth equipment. Based on Codenomicon’s robustness test results using smart model based fuzzing …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools