Microsoft CrowdStrike HPE edge IBM attack surface ukraine CISA Log4j CISA BlackBerry IoT connected device Bluetooth

Bluetooth Reconnection Flaw Could Lead to Spoofing Attacks

A group of researchers at Purdue University’s Center for Education and Research in Information Assurance and Security (CERIAS) recently discovered a vulnerability that affects the many IoT devices running Bluetooth. Bluetooth Low Energy ...
Security Boulevard
Mjellma

What We Need To Know About Bluetooth Security

Since its introduction in the early 2000s, Bluetooth technology has been helping people to connect their devices and share data seamlessly. Wireless microphones and headphones, for example, are there because of Bluetooth ...
Putting an AEG Scale Denial of Service Vulnerability into Action

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

These days IoT devices are an easy entry point for malicious users to invade users privacy. With that in mind, we tested the AEG Smart Scale PW 5653 BT, specifically the Bluetooth ...