all InfoSec news
BSAM: Open-source methodology for Bluetooth security assessment
Help Net Security www.helpnetsecurity.com
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid. “Many of the examples presented during the conference were real tests on devices that attendees – most of them cybersecurity experts – were carrying with them,” they told Help Net Security. The idea was to show just how widespread the problem – and danger … More →
The post …
assessment bluetooth bluetooth low energy conference consumer conversations cybersecurity cybersecurity experts devices don't miss enterprise examples experts hot stuff malicious may methodology private real researchers security security assessment security auditing security researchers smbs technology tests vulnerabilities vulnerability week wireless