Security Leftovers: BlueTooth, Spectre/Meltdown and Huawei Disputes
-
BlueTooth Security Risks
Security risks involving bluetooth vulnerabilities include techniques known as: bluebugging, bluesnarfing, bluejacking, denial of service and exploits for different holes.
When a device is configured in discoverable an attacker may try to apply these techniques.Today mobile security was strongly increased and most attacks fail, yet sometimes security holes are discovered and new exploits emerge. As mobile devices prevent the user from installing unmonitored software freely most of attacks are difficult to carry out.
This tutorial describes the most common Bluetooth attacks, the tools used to carry out these attacks and the security measures users can take to prevent them.
[...]
While bluetooth attacks aren’t widely used (when compared with other types of attacks like phishing or DDOS) almost every person carrying a mobile device is a potential victim, therefore in our countries most people are exposed, also through bluetooth, to sensitive data leak. On the other hand most manufacturers already patched devices to protect them from almost all attacks described above, but they only can issue a fix after the vulnerability was discovered and published (like with any vulnerability).
While there is not defensive software the best solution is to keep the device turned off in public spaces, since most attacks require a short range you can use the device safely in private places. I hope you found this tutorial on Bluetooth Security Risks useful. Keep following LinuxHint for more tips and updates on Linux and networking.
-
Arm Has Many Changes On Tap For Linux 5.6 From Spectre/Meltdown Bits To New RNG
While the Linux 5.5 kernel isn't even released yet, it's ideally coming out on Sunday should there not be a one week delay. But in any event Arm's Will Deacon has already sent in the pull request of the ARM architecture changes for Linux 5.6.
-
The Pentagon pushes back on Huawei ban in bid for ‘balance’
Huawei may have just found itself an ally in the most unexpected of places. According to a new report out of The Wall Street Journal, both the Defense and Treasury Departments are pushing back on a Commerce Department-led ban on sales from the embattled Chinese hardware giant.
That move, in turn, has reportedly led Commerce Department officials to withdraw a proposal set to make it even more difficult for U.S.-based companies to work with Huawei.
Defense Secretary Mark Esper struck a fittingly pragmatic tone while speaking with the paper, noting, “We have to be conscious of sustaining those [technology] companies’ supply chains and those innovators. That’s the balance we have to strike.”
- Login or register to post comments
- Printer-friendly version
- 2872 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago