Please turn on your JavaScript for this page to function normally.
Bluetooth Low Energy
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security …
BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), …
Featured news
Sponsored
Don't miss
- Using AI to drive cybersecurity risk scoring systems
- NIST is chipping away at NVD backlog
- FBI confirms China-linked cyber espionage involving breached telecom providers
- How a Windows zero-day was exploited in the wild for months (CVE-2024-43451)
- How Intel is making open source accessible to all developers