Tag

Device Impersonation

All articles tagged with #device impersonation

technology2 years ago

"Bluetooth Security Flaws Expose All Modern Devices to Hijacked Connections and Data Theft"

Two newly-discovered Bluetooth security flaws, collectively named BLUFFS, allow attackers to hijack the connections of all devices using Bluetooth 4.2 to 5.4, including Apple devices. These flaws exploit vulnerabilities in the Bluetooth architecture, enabling device impersonation and man-in-the-middle attacks. All devices running Bluetooth 4.2 to 5.4 are vulnerable, and there is currently no fix for the vulnerabilities. Users are advised to minimize risk by keeping Bluetooth turned off when not in use and avoiding sending sensitive information via Bluetooth in public places.