Tracking People via Bluetooth on Their Phones

We’ve always known that phones—and the people carrying them—can be uniquely identified from their Bluetooth signatures, and that we need security techniques to prevent that. This new research shows that that’s not ...
‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

‘Incompetent’ Tesla Lets Hackers Steal Cars — via Bluetooth

Tesla cars can be unlocked and stolen via a simple relay attack. The company shrugged and said it’s “a known limitation.” ...
Security Boulevard

Tracking People by their MAC Addresses

Yet another article on the privacy risks of static MAC addresses and always-on Bluetooth connections. This one is about wireless headphones. The good news is that product vendors are fixing this: Several ...

Security Analysis of Apple’s “Find My…” Protocol

Interesting research: “Who Can Find My Devices? Security and Privacy of Apple’s Crowd-Sourced Bluetooth Location Tracking System“: Abstract: Overnight, Apple has turned its hundreds-of-million-device ecosystem into the world’s largest crowd-sourced location tracking ...

Hacking Christmas Gifts: Brushing with Bluetooth

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
Intel

BleedingTooth: Intel Discloses Early, Angering Linux Lovers

A Google researcher discovered a high-severity vulnerability in the Linux Bluetooth stack ...
Security Boulevard

New Bluetooth Vulnerability

There’s a new unpatched Bluetooth vulnerability: The issue is with a protocol called Cross-Transport Key Derivation (or CTKD, for short). When, say, an iPhone is getting ready to pair up with Bluetooth-powered ...
ransomware arrests Ukraine Europol

Bridgefy FAIL: Insecure for Use in Protests

Bridgefy, a young naïve startup, built an app for use-case A. But many people used it for use-case B, which needs a radically stronger security posture ...
Security Boulevard
Towards a Universal Security Solution against Bluetooth Low Energy Attacks

Towards a Universal Security Solution against Bluetooth Low Energy Attacks

For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and ...

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...