Interception of communications, theft of credentials or banking data, denial of service attacks.... WNN analyzes in this article the keys to #BlueTrust and, above all, the potential path of the second phase of the investigation 👇
https://worldnationnews.com/galician-county-tarlogic-found-a-security-flaw-in-bluetooth-technology/
Promises are promises. And so you have something else to discuss between beer and beer, here's an article with the details of #BlueTrust. 👇
@rootedcon #cibersecurity #Bluetooth
https://www.tarlogic.com/blog/bluetrust-bluetooth-vulnerability/
#bluetrust #cibersecurity #bluetooth
Antón and Jesús have killed it. 🔫 The presentation of #BlueTrust at @rootedcon has raised a lot of expectation. But this has only just begun.
Let's go, there are things to come... 🦾🦾🦾
Do you know what #BlueTrust is? A new vulnerability the @Tarlogic Innovation team discovered allows identifying signals from #Bluetooth devices. 🔎
Jesús Mª Gómez and Antonio Vázquez are presenting it right now at @rootedcon
#bluetrust #bluetooth #cybersecurity
It's #BlueTrust time. You, @patowc, have given some of your Chi to Jesus and Anton, right?