Many of us use Bluetooth to connect to our headphones, speakers and even to our car's entertainment system. It’s no surprise scammers are trying to take advantage. The cyber security experts at ...
Bluetooth technology presents significant security risks, with cybercriminals capable of exploiting vulnerabilities from distances equivalent to a football field, according to NordVPN’s cybersecurity ...
Researchers have uncovered a proprietary undocumented command in Chinese manufacturer Espressif's ESP32 chips that could be exploited, to the potential detriment of millions of users. The ESP32 chip ...
As explained by the researchers in a blog post, they have essentially found a way to turn any device such as a phone or laptop into an AirTag “without the owner ever realizing it.” After that, hackers ...
Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. Researchers confirmed ...