Unlimited WordPress themes, plugins & video downloads!

Research

Research – Rikki Don’t Lose That Bluetooth Device

In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don’t want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/148491/Rikki_Dont_Lose_That_Bluetooth_Device.pdf

Source: https://packetstormsecurity.com/files/148491/Rikki-Dont-Lose-That-Bluetooth-Device.html

Related posts
Research

Research - 07103-00013C_FT5KUsrMan-3.0_file.pdf

Research

Research - 2013 Data Protection Maturity Survey Results

Research

Research - 64 Bits Linux Stack Based Buffer Overflow

Research

Research - A Newbies Guide To The Underground Volume 2

Sign up for our Newsletter and
stay informed