Mobile & Wireless Android, Linux, Apple Devices Exposed to Bluetooth Keystroke Injection Attacks A Bluetooth authentication bypass allows attackers to connect to vulnerable Android, Linux, and Apple devices and inject keystrokes. Ionut ArghireDecember 8, 2023
Mobile & Wireless New BLUFFS Bluetooth Attack Methods Can Have Large-Scale Impact: Researcher An academic researcher demonstrates BLUFFS, six novel attacks targeting Bluetooth sessions’ forward and future secrecy. Ionut ArghireNovember 29, 2023
Vulnerabilities CISA Reverses Course on Malicious Exploitation of Video Conferencing Device Flaws CISA has removed from its KEV catalog five Owl Labs video conferencing flaws that require the attacker to be in Bluetooth range. Eduard KovacsOctober 6, 2023