Beware .. stealing your phone data via Bluetooth



[ad_1]

Monday, July 30, 2018 03:12 AM (New York News) – A new research paper revealed a bug in the Bluetooth protocol, which allows attackers to intercepter and alter data through wireless communication.

A large number of device manufacturers are fixing this serious flaw, affecting every chip manufactured by Intel, Broadcom and Qualcomm.

People using Bluetooth technology should connect smartphones, computers, or other devices to make sure the patch is installed as soon as possible.

A bug known as CVE-2018-5383 allows an attack to target unencrypted devices, providing an attacker the ability to examine all reciprocal data, which may include contacts stored on the device. Device, typed pbadwords or information used by the equipment. Medical or POS, or cars.

Attackers via Bluetooth keyboards can also open a command window or malicious websites under connected phones or computers.

The Bluetooth protocol relies on several factors to allow previously disconnected devices to configure a secret key for encrypted connections.

The attack uses a newly developed format to exploit an unknown major protocol flaw for more than a decade, allowing hackers to force devices to use a generic cryptographic key allowing them to monitor and modify wireless data.

The problem is that the way Bluetooth works in the number of vendor devices does not happen from encrypted key exchanges when Bluetooth devices try to badociate with it, prompting many manufacturers to issue hardware and software updates. IOS Android.

LG, Huawei, Intel, Dell and Lenovo have also released security reform files. Microsoft is using an older version of the Bluetooth standard less secure than the current faulty standard, despite Microsoft's badertion that its systems are not directly affected by bugs, but the report says there are many Wireless chips for Windows products. 7, 8.1 and 10 appear in the list of models concerned.

The CERT recently released a note on the subject: the information shows that both devices must be weak for successful attacks, that is to say that as long as it is corrected, the User will not be in danger. Use Bluetooth technology to transfer data or control devices to ensure that patches are installed on at least one of these devices.

This imbalance is different from the BlueBorne virus that broke out last year, threatening millions of phones, laptops and smart home appliances and making them vulnerable to hacker control. The virus has affected almost all Bluetooth devices , Microsoft, Samsung,

Source: Source: Delegation of Ipad and Ipad computers.

The transfer of news from the source of the previous "Incoming" and was exposed through the Arab News.

[ad_2]
Source link