Please turn on your JavaScript for this page to function normally.
The dangers of connecting phones to connected cars

As smart, connected cars get more ubiquitous, they are often the only option you get when renting a car from a rental agency. With all the reports about car hacking, you might …

Pwnie Express
Pwnie Express open sources IoT and Bluetooth security tools

Pwnie Express announced the availability of open sourced versions of its Blue Hydra and Android build system software. The release of these tools enable comprehensive …

signal
Consumers willing to share personal info for a reward

Nearly three in four people have security concerns about using beacon technology on their mobile devices. However, despite these concerns, six in ten will still share personal …

Sniffing and tracking wearable tech and smartphones

Researchers at Context Information Security have demonstrated how easy it is to monitor and record Bluetooth Low Energy signals transmitted by many mobile phones, wearable …

Bluetooth vulnerabilities becoming easier to exploit

Codenomicon warns consumers about the poor quality and security of Bluetooth equipment. Based on Codenomicon’s robustness test results using smart model based fuzzing …

Microsoft fixes 22 vulnerabilities

In today’s Patch Tuesday, Microsoft released 4 bulletins addressing vulnerabilities affecting Windows and Office. Amol Sarwate, Vulnerability Labs Manager for Qualys, …

Broadcom releases 40nm Wi-Fi and Bluetooth combo chip

Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …

Bluelog: Bluetooth site survey tool

Bluelog is a Linux Bluetooth scanner written to do a single task, log devices that are in discoverable mode. It is intended to be used as a site survey tool, determining how …

Don't miss

Cybersecurity news