Hardware security keys are among the most robust account security tools of today. However, researchers…
bluetooth
-
- Cyber Security NewsHacking NewsNewsVulnerabilities
New BleedingTooth Bluetooth Vulnerability Targets Linux
Researchers have found a new vulnerability affecting Linux devices. Dubbed BleedingTooth, the Bluetooth vulnerability allows…
- Cyber Security NewsHacking NewsNewsVulnerabilities
BLURtooth Vulnerability Threatens Secure Bluetooth Device Connections
A newly discovered vulnerability dubbed BLURtooth has made it into the news, the exploit literally…
- Cyber AttackCyber Security NewsHacking NewsNewsVulnerabilities
Spectra Attack Target Separation Between Wireless Communication Chips For Coordinated Attacks
While the tech giants were busy managing vulnerabilities in Bluetooth and WiFi chips, researchers have…
- Cyber AttackCyber Security NewsHacking NewsNewsVulnerabilities
Apple Patched AirDos Vulnerability With iOS 13.3 Along With Other Security Fixes
Apple has rolled out iOS 13.3 this week. With this iOS update, Apple has fixed…
-
Security keys are designed to save users from the burden of remembering passwords, with the added…
- Cyber Security NewsHacking NewsNewsTech
iOS 13 Now Warns Users Of Background Apps Secretly Tracking Location
Applications tracking users’ locations have been a pain in the neck for some time. While…
- Cyber AttackCyber Security NewsHacking NewsNewsVulnerabilities
Smart Hair Straightener Vulnerability Discovered That Could Set Your House on Fire
The convenience of IoT and smart devices attracts us all, however the resilience to being…
- Cyber Security NewsHacking NewsNewsVulnerabilities
CarBlues – Bluetooth Vehicle Hack Exploit Affects Millions Of Vehicles Exposing Users PII
As discovered recently, millions of vehicles are on the verge of hacking due to a…
- Cyber Security NewsHacking NewsNewsVulnerabilities
BLEEDINGBIT – Two Zero Day Vulnerabilities Affecting Wireless Access Point Bluetooth Chips
Wireless Access Points (WAPs) form the core of enterprise cyber security as they serve as…
- 1
- 2