The latest standard for the Bluetooth wireless networking protocol, Bluetooth 4.2, was released last week. Bluetooth 4.2 opens up new deployment options for users of Bluetooth Low Energy (BLE) devices ...
A new report from ZDNet exposes that a new Bluetooth vulnerability called BLURtooth has emerged. This allows the attackers to weaken and overwrite the Bluetooth encryption giving access to ...
A new Bluetooth vulnerability could allow an attacker to downgrade or bypass Bluetooth encryption keys, opening the door to man-in-the-middle attacks or other types of malicious exploits. The flaw, ...
There will always be some security issue with RF connections. Always. Show any popular RF data protocol that doesn't have some security issue announced about once a year. I don't know if it is due to ...
Posts from this author will be added to your daily email digest and your homepage feed. is The Verge’s executive editor. He has covered tech, policy, and online creators for over a decade. A ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results