Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
New Bluetooth Flaw Can Help Hackers Easily Target Nearby Devices
Cyber security researchers have found a Bluetooth flaw that might let hackers into your Bluetooth device. “The flaw exposes devices powered with Bluetooth 4.0 or 5.0 technology, allowing attackers to unauthorized connect to a targeted nearby device by overwriting the authenticated key or reducing the encryption key strength.” View the whole article here.
You must be logged in to reply to this topic.