Bluetooth Devices Could Be Vulnerable to BrakTooth Security Flaws techtimes.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from techtimes.com Daily Mail and Mail on Sunday newspapers.
The two specifications define the technical and policy requirements for devices that want to operate over Bluetooth connections.
The Bluetooth Impersonation Attacks, or BIAS, allow attackers to impersonate a device and to establish a secure connection with a victim without possessing the long-term key shared by the impersonated device and the victim. This bypasses Bluetooth s authentication mechanism. The BIAS attacks are the first uncovering issues related to Bluetooth s secure connection establishment authentication procedures, adversarial role switches, and Secure Connections downgrades, the researchers said. Our attacks are stealthy because the Bluetooth standard does not require to notify end users about the outcome of an authentication procedure, or the lack of mutual authentication.
While Bluetooth has revolutionized hands-free communications, it is not without its faults, particularly in regards to security. Bluetooth has a history of vulnerabilities that continues to put corporations at risk of a major security breach. The vulnerabilities provide an entry point for attackers to read encrypted conversations, disable and/or deadlock devices, and even remotely take over devices.
Dangers of Bluetooth Attacks
There have been many noteworthy Bluetooth vulnerability discoveries in recent years and the sophistication of the attacks will only evolve. Disturbingly, hackers no longer need to be nearby the devices to carry out their exploits.
Bluetooth was designed for short-range communications, but because they contain radios, cyber thieves can exploit a system remotely and then leverage that system’s Bluetooth interface to launch an attack. In this capacity, it is possible for an attacker to not only run these attacks remotely while in close proximity, but also co