Clicky

Bluetooth Vulnerabilities Allow Impersonation Attacks on Devices

Bluetooth Vulnerabilities Allow Impersonation Attacks on Devices | IT Security News

This article has been indexed from Heimdal Security Blog

The Carnegie Mellon University (CMU) has recently shared an advisory highlighting some newly discovered Bluetooth security bugs. The advisory states that security specialists at France’s national cybersecurity agency ANSSI have discovered multiple vulnerabilities in Bluetooth Core and Mesh specifications authorizing Man-in-the-Middle attacks. The Bluetooth Core Specification and Mesh Profile Specification are two specifications used to define the technical and […]

The post Bluetooth Vulnerabilities Allow Impersonation Attacks on Devices appeared first on Heimdal Security Blog.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to “allow cookies” to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click “Accept” below then you are consenting to this.

Close


Similar Posts