Patches to remedy the vulnerabilities should be released over the coming weeks. Cybercriminals could exploit several vulnerabilities in Bluetooth to carry out impersonation attacks and masquerade as a legitimate device during the pairing process, according to the Bluetooth Special Interest Group (SIG). The security flaws, which affect the Bluetooth Core and Mesh Profile specifications, were discovered by researchers at France’s national cybersecurity agency … More Bluetooth bugs could allow attackers to impersonate devices
Why are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor. There’s virtually no realm in healthcare today that isn’t adopting more technology. From real-time wireless access to your own health parameters through smart watches and wearables to implanted devices inside your … More Securing medical devices: Can a hacker break your heart?
Google releases a fix for the security hole that, if left unplugged, could allow attackers to run malicious code with no user interaction. Google has rolled out a security update to address a critical flaw in Android’s Bluetooth implementation that allows remote code execution without user interaction. The vulnerability, tracked as CVE-2020-0022, affects devices running Android … More Critical Bluetooth bug leaves Android users open to attack
A helmet may not be enough to keep you safe(r) while riding an e-scooter. Electric scooters are steadily becoming a popular alternative for short commutes. Besides convenience, however, they also introduce a range of cybersecurity and privacy risks, according to a study by the University of Texas at San Antonio (UTSA). The review – which UTSA said is “the … More Electric scooters vulnerable to remote hacks
From time to time, our readers raise questions or issues related to topics that concern, or simply interest them. One such issue was brought up recently by a Twitter user, who asked us: “Do you have any posts discussing the risk to banks when people use their cell phone inside them, ignoring the security guards?” … More What are the risks of allowing people to use their smartphone at the bank?