A new Bluetooth security flaw has been discovered that would potentially allow an attacker to connect to a user device without authentication, according to a statement by the Bluetooth Special Interest Group. The statement says that, for the attack to be successful “an attacking device would need to be within wireless range of a vulnerable Bluetooth device”. While Apple protects against some forms of Bluetooth attack by requiring apps to ask user permission before a connection is initiated, vulnerability to so-called Man-In-The-Middle (MITM) attacks is less clear.
Experts Comments
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.
Be part of our growing Information Security Expert Community (1000+), please register here.
Linkedin Message
@Jake Moore, Cybersecurity Specialist, provides expert commentary at @Information Security Buzz.
"Bluetooth risks are rare but when they work, they can be extremely impactful...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/bluetooth-security-flaw-leaves-devices-vulnerable-to-hackers
Facebook Message
@Jake Moore, Cybersecurity Specialist, provides expert commentary at @Information Security Buzz.
"Bluetooth risks are rare but when they work, they can be extremely impactful...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/bluetooth-security-flaw-leaves-devices-vulnerable-to-hackers