Communick News
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months ago

New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing

gbhackers.com

external-link
message-square
9
fedilink
  • cross-posted to:
  • securitynews@infosec.pub
45
external-link

New Bluetooth Vulnerability Leak, Your Passcode to Hackers During Pairing

gbhackers.com

Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 7 months ago
message-square
9
fedilink
  • cross-posted to:
  • securitynews@infosec.pub
New Bluetooth Vulnerability, this flaw could allow hackers to intercept passcodes during the device pairing process.
alert-triangle
You must log in or register to comment.
  • atrielienz@lemmy.world
    link
    fedilink
    English
    arrow-up
    23
    ·
    7 months ago

    The comma makes this title read very weird.

    • can@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      ·
      7 months ago

      I can’t seem, to parse it for the life of me

    • massive_bereavement@fedia.io
      link
      fedilink
      arrow-up
      10
      ·
      7 months ago

      Didn’t know Christopher Walken was into netsec.

      • c0smokram3r@midwest.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        6 months ago

        deleted by creator

    • toynbee@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      7 months ago

      I would have called this a comma splice, but apparently what I was taught that is - just a comma incorrectly inserted into a sentence - is not the entirety of what a comma splice is.

      https://en.m.wikipedia.org/wiki/Comma_splice

  • Yer Ma@lemm.ee
    link
    fedilink
    English
    arrow-up
    5
    ·
    7 months ago

    Who uses Bluetooth passcodes?

    • remotelove@lemmy.ca
      link
      fedilink
      English
      arrow-up
      9
      ·
      7 months ago

      They are used for most pairing sequences, but we don’t type them in anymore. They are used more to validate that it’s you that are connecting two devices.

      • reddig33@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        7 months ago

        In other words, this vulnerability isn’t that big of a deal.

        • remotelove@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 months ago

          Maybe? There are a ton of shitty BT implementations in the wild that will never get patched. This does seem quirky at first glance, but could just as easily affect millions of vehicles, as an example.

          If I was so inclined, I would camp out in a busy parking lot with an antenna just to see what I could find.

  • drspod@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    7 months ago

    This vuln is not new, it was published 3.5 years ago: https://nvd.nist.gov/vuln/detail/CVE-2020-26558

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 32 users / day
  • 495 users / week
  • 1.5K users / month
  • 4.81K users / 6 months
  • 1 local subscriber
  • 7.17K subscribers
  • 2.22K Posts
  • 4.06K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • BE: 0.19.9
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org