CYBERNEWSMEDIA Network:||
AD · 970×250

Mobile & Wireless·Vulnerabilities

BLURtooth Vulnerability Can Allow Bluetooth MITM Attacks

A security vulnerability in the Cross-Transport Key Derivation (CTKD) of devices supporting both Bluetooth BR/EDR and LE could allow an attacker to overwrite encryption keys, researchers have discovered. The post BLURtooth Vulnerability Can Allow Bluetooth MITM Attacks appeared first on SecurityWeek.

A security vulnerability in the Cross-Transport Key Derivation (CTKD) of devices supporting both Bluetooth BR/EDR and LE could allow an attacker to overwrite encryption keys, researchers have discovered.

Latest News

CYBERNEWSMEDIAPublisher