Home Search

bluetooth - search results

If you're not happy with the results, please do another search
BrakTooth Flaws

Millions of Bluetooth Devices Affected by BrakTooth Flaws

Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design...
BrakTooth Flaws

New BIAS Vulnerability Affects All Modern Bluetooth Devices

Academic researchers at the École Polytechnique Fédérale de Lausanne (EPFL), a research institute and university in Lausanne Switzerland, discovered a new vulnerability in the...
BrakTooth Flaws

In-Built Design Flaw Makes Bluetooth Devices Vulnerable

A recent discovery revealed that mobile applications that work with Bluetooth devices have a built-in design flaw that makes them vulnerable to hacks. According to...
4 in 10 Companies Expose Unsafe Network Services Online, network and security

New vulnerability lets attackers spy on your Data sent via Bluetooth: Researchers

With technology advancing day by day, cyber-attackers too are finding innovative ways to get into our devices. Researchers discovered that Bluetooth-enabled devices, including mobile phones,...
Hacked Smartphones

How to Know if Your Smartphone is Hacked?

Nowadays, it’s hard to find a person without a smartphone. With the ease of technology, the proliferation of smartphone culture has also brought in...
cybersecurity, password, password management,

This Device Simplifies Password Management and Protects User Credentials

With a mission to provide cybersecurity to individuals to safeguard themselves from threat actors, a Pune-based (Maharashtra, India) cybersecurity enthusiast came up with a...
Zero Trust, cybersecurity

Thwarting Threats with a Zero Trust Security Posture

Hackers are breaching our nation’s critical infrastructure and with security threats lurking in the enterprise, Zero Trust adoption continues to rise. According to Cybersecurity...
Apple AirTag hacked

German Security Researcher Claims Apple AirTag can be Hacked

On April 20, 2021, Apple launched its upgraded product line of iPads and iMacs in a live streaming event from its HQ in Cupertino....
Akamai MFA

Akamai Says Its Phish-Proof Solution Bridges MFA Security Gaps

Akamai Technologies, a cybersecurity solutions provider, today announced the launch of Akamai MFA, a cloud-based solution to close the security gaps that exist in...
Doxing attacks

How to Know if You’re Being Stalked by Stalkerware

At a time when everyone is more connected than ever, cybercriminals too have become more active looking for ways to turn an adverse situation...

MOST POPULAR

RECENT POSTS