Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

WPA2 Going the Way of WEP After Wi-Fi Researchers Find Critical Flaw

The WPA2 (Wi-Fi Protected Access II) protocol that’s used by most Wi-Fi networks today has been compromised, and a way to intercept traffic between computers, phones, and access points has been found.

WPA2 Going the Way of WEP After Wi-Fi Researchers Find Critical Flaw

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Huge Bluetooth Attack Exposes 8 Billion Devices via Bluetooth on All Platforms  (Read 42 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22837
  • .: Surf Queen
    • WWW
Huge Bluetooth Attack Exposes 8 Billion Devices via Bluetooth on All Platforms
14 September 2017, 10:10 am

BlueBorne is a new way of attacking and getting complete control of the desktop, mobile, and IoT platforms using a Bluetooth vulnerability.

Bluetooth is a communication and data exchanging standards that present in pretty much all of the today's devices. The total number is estimated at over eight billion, which means that there are a lot of targets out there ready to be hacked.

The vulnerability has been identified by a company named Armis Labs, which has detailed all the ways a user can be hacked, no matter the platform they are using. This means that it doesn’t really matter if you’re on a Windows, Linux, or Mac OS, not to mention all the mobile variants. Basically, if you have a Bluetooth, you’re exposed.

The best protection is updating the OS or closing the Bluetooth

The BlueBorne attack vector allows a hacker to remotely enter your operating system without the need to have it paired or even to be set on dis... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle