Cyber security news for all


    Are Bluetooth Devices Really Safe?

    Recently, Ohio State University researched the safeness of the bluetooth devices. They have found a crucial safety threat in bluetooth devices that makes them exploitable by hackers. Researches also concluded if necessary actions isn’t taken while pairing the device for the first time, this vulnerability could led to your device to be hacked.

    This vulnerability is said to be stemming from the low energy bluetooth device’s communication system with the paired devices that remote-control them. When you try to connect a bluetooth device for your computer (or anything that allows a bluetooth device to be set up, like bluetooth headphones for your mobile device), the device broadcasts a unique identifier known as the UUID. The way this signal works is while it is broadcasting, the device can catch the broadcasted signal to identify what kind of device is planned to be set-up with the device, then proceeds to establish a safe communication with the said device. If there are little or none encryption methods with your bluetooth device, hackers can use that signal to hack into the connection and gather information.

    “At a minimum, a hacker could determine whether you have a particular Bluetooth device, such as a smart speaker, at your home, by identifying whether or not your smart device is broadcasting the particular UUIDs identified from the corresponding mobile apps.” Claimed associate professor of computer science and engineering Z. Lin, at the Ohio State University.

    To estimate the impact of the vulnerability, they have conducted a research by building a hacking device that caught the unique UUID inbetween the bluetooth device and the paired device.

    Researchers have found that the issue is mostly about the initial pairing, they have tested with multiple devices, and found that if the initial pairing process was made to be more secure the problem would probably vanish. If not, devices would continue to be vulnerable to fingerprint or eavesdropping attacks.

    Recent Articles

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox