'Rifle' Sniffs Out Vulnerability in Bluetooth Devices
'Rifle' Sniffs Out Vulnerability in Bluetooth Devices toggle caption Humphrey Cheung/TomsNetworking.com If you've used your cell phone today -- or any other wireless device that uses Bluetooth technology -- someone could be watching you. Sponsor Message Protecting Bluetooth Devices · Do not accept files transmitted via Bluetooth wireless technology or any other technology from unknown or suspicious entities. · When you buy your mobile device, read the manual to discover how to turn Bluetooth on and off, how to adjust security settings, and how to "pair" with other devices. Hering, cofounder of a wireless security think tank called Flexilis, says he uses the "rifle" only to determine security vulnerabilities, not to actually hack wireless devices to obtain personal information.

What is Bluebugging and how do hackers use it? Learn how to secure your devices



Discover Related

Bluetooth 6.0: Unveiling the Future of Connectivity

Tech Tonic | Bluetooth’s constancy has given us the soundtrack to life

Are Bluetooth connections secure?

You are at risk if location and bluetooth are kept ON

Apple and Google join forces to block misuse of bluetooth tracking devices

Apple and Google join hands for common good, will work to defeat trackers and stalkers

Apple and Google launches an initiative to restrict unwanted tracking

Apple AirTags: What You Need To Know About Tracking Danger

Tesla cars, smart locks prone to Bluetooth vulnerability hack, report says

BrakTooth Flaws Affect Billions of Bluetooth Devices

Signal's Founder Hacked a Notorious Phone-Cracking Device

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

Microsoft's Brad Smith thinks Coronavirus contact tracing Bluetooth tech isn't meaningful

Chipmaker Dialog seeks to make Bluetooth coronavirus apps more accurate

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

The Clever Cryptography Behind Apple's 'Find My' Feature

Bluetooth is serially insecure. Here's how to protect your devices

Google Will Replace Titan Security Key Over a Bluetooth Flaw

Congress' complaint of EVM tampering through bluetooth baseless: Election Commission

Cong's claim of EVM tampering through bluetooth in Gujarat baseless: EC

How a Bug in an Obscure Chip Exposed a Billion Smartphones to Hackers
