Home Search
bluetooth - search results
If you're not happy with the results, please do another search
Millions of Bluetooth Devices Affected by BrakTooth Flaws
Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...
New BIAS Vulnerability Affects All Modern Bluetooth Devices
Academic researchers at the École Polytechnique Fédérale de Lausanne (EPFL), a research institute and university in Lausanne Switzerland, discovered a new vulnerability in the...
In-Built Design Flaw Makes Bluetooth Devices Vulnerable
A recent discovery revealed that mobile applications that work with Bluetooth devices have a built-in design flaw that makes them vulnerable to hacks.
According to...
New vulnerability lets attackers spy on your Data sent via Bluetooth: Researchers
With technology advancing day by day, cyber-attackers too are finding innovative ways to get into our devices.
Researchers discovered that Bluetooth-enabled devices, including mobile phones,...
How to Know if Your Smartphone is Hacked?
Nowadays, it’s hard to find a person without a smartphone. With the ease of technology, the proliferation of smartphone culture has also brought in...
This Device Simplifies Password Management and Protects User Credentials
With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...
Thwarting Threats with a Zero Trust Security Posture
Hackers are breaching our nation’s critical infrastructure and with security threats lurking in the enterprise, Zero Trust adoption continues to rise. According to Cybersecurity...
German Security Researcher Claims Apple AirTag can be Hacked
On April 20, 2021, Apple launched its upgraded product line of iPads and iMacs in a live streaming event from its HQ in Cupertino....
Akamai Says Its Phish-Proof Solution Bridges MFA Security Gaps
Akamai Technologies, a cybersecurity solutions provider, today announced the launch of Akamai MFA, a cloud-based solution to close the security gaps that exist in...
How to Know if You’re Being Stalked by Stalkerware
At a time when everyone is more connected than ever, cybercriminals too have become more active looking for ways to turn an adverse situation...