Please turn on your JavaScript for this page to function normally.
Bluetooth Low Energy
![BSAM](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12133240/bsam-open-source-400x200.webp)
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security …
![Bluetooth](https://img.helpnetsecurity.com/wp-content/uploads/2022/05/17151901/bluetooth-key-400x200.jpg)
BLE vulnerability may be exploited to unlock cars, smart locks, building doors, smartphones
A Bluetooth Low Energy (BLE) vulnerability discovered by NCC Group researchers may be used by attackers to unlock Teslas (or other cars with automotive keyless entry), …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD