bluetooth

Apple Lets Stalkers Find YOU — ‘nRootTag’ Team Breaks AirTag Crypto
Richi Jennings | | AirTag, AirTags, Apple, Apple AirTag, apple bug, apple hack, apple hacker, Apple iCloud, BLE, bluetooth, Bluetooth low energy, Bluetooth Protocol, bluetooth security, Bluetooth vulnerability, Find My iPhone, ICloud, icloud hack, nRootTag, OpenHayStack, SB Blogwatch
Dumb Design + Crud Code = Privacy Panic: It’s been SEVEN MONTHS, but Tim’s crew is yet to fix the bugs ...
Security Boulevard

New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report
Tom Eston | | AI, AI Hype, AirTag, Android 6, Apple, bluetooth, Cyber Security, Cybersecurity, Data breaches, Data Privacy, Digital Privacy, Episodes, Exploits, google, Information Security, Infosec, ios, Malware, Phishing, Podcast, Podcasts, Privacy, Secret Trackers, security, social engineering, Stalking, technology, trackers, verizon, Verizon DBIR, Vulnerabilities, Weekly Edition
In episode 330 Tom, Scott, and Kevin discuss the new features for iPhones and Android phones designed to warn users about secret trackers, possibly aiding in identifying stalkers. The hosts discuss Apple ...
Tracking People via Bluetooth on Their Phones
Bruce Schneier | | academic papers, bluetooth, identification, Privacy, Stalking, tracking, Uncategorized
We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth
Richi Jennings | | BLE, bluetooth, Elon Musk, iot, Pressing a button is beyond most Tesla users capabilities, relay attack, SB Blogwatch, Tesla, TSLA
Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.” ...
Security Boulevard
Tracking People by their MAC Addresses
Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones. The good news is that product vendors are fixing this: Several ...
Security Analysis of Apple’s “Find My…” Protocol
Bruce Schneier | | academic papers, Apple, bluetooth, crowdsourcing, de-anonymization, Privacy, Reverse Engineering, security analysis, tracking, Uncategorized
Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“: Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking ...
Hacking Christmas Gifts: Brushing with Bluetooth
If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...

BleedingTooth: Intel Discloses Early, Angering Linux Lovers
A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
Security Boulevard
New Bluetooth Vulnerability
Bruce Schneier | | Authentication, bluetooth, iPhone, man in the middle attacks, patching, Uncategorized, Vulnerabilities
There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered ...

Bridgefy FAIL: Insecure for Use in Protests
Bridgefy, a young naïve startup, built an app for use-case A. But many people used it for use-case B, which needs a radically stronger security posture ...
Security Boulevard