Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Are Bluetooth Devices Vulnerable to Hackers?
- This topic has 0 replies, 1 voice, and was last updated 1 year, 4 months ago by .
-
Topic
-
Although bluetooth is believed to be an extremely helpful piece of technology, flaws have been found concerning it’s vulnerability to hackers. The flaw is involved in the way that the low energy bluetooth devices communicate with your mobile phone. What this means is that a hacker can identify what bluetooth devices you’re using and see if there are any apps on these devices that he would be able to hack into. You may think that this is something that wont happen to you, but the Google Play store was found to contain more than 18,000 apps that were vulnerable to this security flaw.
https://cyware.com/news/how-vulnerable-are-bluetooth-devices-37aac9d7
You must be logged in to reply to this topic.