The latest standard for the Bluetooth wireless networking protocol, Bluetooth 4.2, was released last week. Bluetooth 4.2 opens up new deployment options for users of Bluetooth Low Energy (BLE) devices ...
A new Bluetooth vulnerability could allow an attacker to downgrade or bypass Bluetooth encryption keys, opening the door to man-in-the-middle attacks or other types of malicious exploits. The flaw, ...
A new report from ZDNet exposes that a new Bluetooth vulnerability called BLURtooth has emerged. This allows the attackers to weaken and overwrite the Bluetooth encryption giving access to ...