Bluetooth
Open-source project enables Raspberry Pi Bluetooth Wi-Fi network configuration
Remote.It released its open-source project to enable Raspberry Pi Bluetooth (BLE) Wi-Fi network configuration. The project allows a computer or mobile device to easily …
Firmware update hides Bluetooth fingerprints
A smartphone’s unique Bluetooth fingerprint could be used to track the device’s user–until now. A team of researchers has developed a simple firmware update that can …
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security …
Issue in digital COVID-19 test could have allowed individuals to falsify results
WithSecure and Cue Health have worked together to address a security issue that WithSecure discovered in Cue’s COVID-19 test, which delivers the results of a nasal swab test …
Renesas develops wireless microcontrollers to support Bluetooth 5.3 LE specification
Renesas Electronics Corporation announced that it is developing new microcontrollers (MCUs) that will support the recently released Bluetooth 5.3 Low Energy (LE) …
Keysight’s IoT Security Assessment software offers automated cybersecurity validation of IoT devices
Keysight Technologies has delivered a new Internet of Things (IoT) Security Assessment software solution that enables IoT chip and device manufacturers, as well as …
Digital key builds on past practices to create a more secure future
Too often, we assume that new technology replaces the old, but technology often builds off past generations, ideas, and success, rather than abandoning it altogether. Some …
Nodle partners with ESTV to expand its reach into gaming and esports
Nodle announces a strategic partnership with ESTV, the global leader in eSports content streaming. With ESTV boasting over 29.6M unique viewers and 124.8M viewership minutes …
Protect your smartphone from radio-based attacks
By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone …
Kloudspot and Cisco Meraki help organizations offer safer and smarter workspace experiences
Kloudspot announced it has partnered with Cisco Meraki to help organizations offer safer and smarter workspace experiences for customers and employees. The Kloudspot Platform …
CCC Digital Key 3.0 enables drivers and passengers to use their mobile device as a digital key hands-free
The Car Connectivity Consortium (CCC) announced that its CCC Digital Key Release 3.0 specification is finalized and now available to CCC members. The new specification enables …
Transition Networks 24VDC Passive PoE Module adds flexibility to its all-in-one switch
Transition Networks announced a new accessory that adds even more flexibility to its Self-Enclosed Managed Hardened Gigabit Ethernet PoE++ Switch (SESPM). The new Passive PoE …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments