News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Researchers hack encrypted Bluetooth connections
B2B Cyber ​​Security ShortNews

Researchers at Eurecom University in the south of France have discovered Bluetooth vulnerabilities and developed attacks for them. The so-called “BLUFFS” can be used to break into Bluetooth sessions, spoof the device identity and carry out man-in-the-middle attacks. The “BLUFFS” attacks by Eurecom researchers are tough: they rely on vulnerabilities in the structure of Bluetooth. Daniele Antonioli, Assistant Professor at Eurecom University, has discovered the possibilities for Bluetooth attacks that exploit previously unknown vulnerabilities in the Bluetooth standard. The vulnerabilities relate to how session keys are derived to decrypt data in exchange. Weak points in the Bluetooth architecture The defects found…

Read more

Gatekeeper: hands-free, wireless, and passwordless authentication
B2B Cyber ​​Security ShortNews

Increased security requirements in industrial companies in the context of data traffic are therefore absolutely necessary in order to ward off cyber attacks from outside and thus to maintain production. Secure authentication and user-friendly for every access control, ProSoft presents the GateKeeper, an intelligent and wireless login management using proximity authentication. On the one hand, the “factory of the future” stands for effective just-in-time production as well as intelligent and self-regulating systems. On the other hand, it also stands for increased data volume and communication between people and machines, as well as between machines. Increased security requirements in industrial companies in the context of data traffic are therefore absolutely necessary in order to prevent cyber attacks from outside ...

Read more

Bluetooth attacks on mobile devices
Kaspersky_news

Bluetooth attacks marked the beginning of mobile platform threats. The first known mobile worm, Cabir, was distributed via Bluetooth. Bluetooth is no longer the primary infection vector for mobile threats, but it can be used for specialized attacks. Almost all such compromises are now located in the operating systems of the users and are created with the help of standard functions of the operating system. "In my opinion, there is little chance that these attacks will be spread by exploiting vulnerabilities in the Bluetooth stack," comments Victor Chebyshev, security expert at Kaspersky. "Because it is quite complicated to launch a mass attack through this channel ...

Read more

Bluetooth locks cracked with chip cans
B2B Cyber ​​Security ShortNews

Fraunhofer researchers crack Bluetooth locks from Tapplock. A self-made directional antenna made of potato chip boxes and two standard mini-computers are sufficient to crack Bluetooth locks from the US manufacturer Tapplock in seconds. This has been proven by researchers at the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt. The manufacturer was informed of the weaknesses and has since remedied them in one of its models. Bluetooth locks cracked in seconds Cumbersome rummaging for the bike lock or locker key is no longer necessary with a modern Bluetooth lock: You simply lock the lock with your fingerprint or an app on your smartphone that can be accessed via Bluetooth Low ...

Read more