1,300 Harbor cloud storage vulnerable to attack: Update immediately!

1,300 Harbor cloud storage vulnerable to attack: Update immediately!

Researchers from Palo Alto Networks' Unit 42 have discovered a critical vulnerability in a popular open source cloud system.
Read More

TOP virus scan to safely scan a suspicious email attachment

Normally we all have antivirus software that resides on our computers to protect data files from malicious ...
Read More

WannaCry ransomware continues to invade computers

The infamous WannaCry ransomware that became known in May on 2017 continues to invade computers. Findings are coming today ...
Read More

Albanian gangs use cryptocurrencies for money laundering

UK police are particularly concerned as 'famous' Albanian gangs, involved in cocaine circuits, are now using ...
Read More

Germany's digital frontier for cyberattacks!

Germany is in the process of developing a new cybersecurity strategy that will introduce digital borders in the event of a particularly aggressive cyberattack.
Read More
Latest Posts

Bluetooth vulnerability affects Apple, Qualcomm and Intel devices!

Bluetooth is used worldwide as one of the most convenient methods of connecting and controlling connected devices. However, according to a recent report, one has been identified vulnerability under the brand name KNOB (Key Negotiation of Bluetooth) on Bluetooth connections.


All Bluetooth compatible devices can be affected by vulnerability, which allows attackers to spy on a victim's personal conversations. The hackers they can also take advantage of the vulnerability to steal data on the compromised device.

When creating a Bluetooth connection, both devices are based on one encryption key. Hackers in order to carry out the attack exploit the vulnerability in the Bluetooth standard and weaken this encryption instead of disabling it immediately.

Vulnerability affects devices from some of the most well known manufacturers, in particular Apple, Qualcomm and Intel. Companies such as Apple, Microsoft, Microsoft CiscoThe Google, Blackberry, Broadcom and Chicony have already released a patch to fix the bug, according to reports Mashable.

The team of researchers from the University of Technology and Design in Singapore, the University of Oxford and the CISPA Helmholtz Information Center, who found this critical vulnerability, explained:

"We found a serious vulnerability in Bluetooth that allows an intruder to break his security mechanisms for any device that is compatible with the standard. As a result, the intruder can hear or change the content of the communication via Bluetoth even among devices that have previously been successfully combined. "

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by
Hack Unamatata

About Hack Unamatata

Take great photos, someone is stalking you

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *