A large scale patching exercise to resolve a serious vulnerability in the Bluetooth specification that allows attackers to intercept and tamper with data exchanged wirelessly is underway. The disclosure in a research paper is serious because it allows people to perform a man-in-the-middle attack on the connection between vulnerable devices, reports Arstechnica.
From there, attackers can view any exchanged data, which might include contacts stored on a device, passwords typed on a keyboard, or sensitive information used by medical, point-of-sale, or automotive equipment. Attackers could also forge keystrokes on a Bluetooth keyboard to open up a command window or malicious website in an outright compromise of the connected phone or computer.
“This attack lets an attacker who can read and modify Bluetooth traffic during pairing force the key to be something they know,” JP Smith, a security engineer and Bluetooth security expert at security firm Trail of Bits, told Ars. “It’s not mathematically/theoretically novel at all, and it’s in fact about the simplest attack you can do on elliptic curve cryptosystems. Notably, this is a protocol-level fault, so if you implemented the Bluetooth spec out of the book (without some optional validation), you have this bug.”
Sweat in peace, don’t bleed in war…
Whether you believe it was General Patton, General Shwarzkopf or another historic figure who coined these words – the point it makes has never been more relevant than today in the world of business, as well as in the mindset of the military. Even if the violent imagery doesn’t reflect your business leadership style, please read on, because we all need to consider how strategic neglect can lose business fast - faster than ever in fact. The same impetus that can create business value quickly from nothing can return it to dust with a speed that defies human understanding.read more
Smartphone, Dumb Owner? Strengthen Your Mobile Security
With the growth in the use of smartphones and tablets in the workplace and the increase in personal use for such things as online banking, cybercriminals are turning their nefarious attention to mobile devices. Internet security giant Symantec has revealed that mobile malware variants soared by 54 per cent in 2017 when compared to the previous year.read more
Prepare Against Cyberattacks - There Are Resources Available
It is foolish, in the mostly digital world we now live in, to assume that there is someone available to bail you out. Quite simply the more digitalised we get, the more self-sufficient we need to become. Protecting our assets online has never been such an important aspect of any business. There are a multitude of sites, services and products available to help, Government Agencies, the police, National Cyber Security Centre all willing to help and spraying the internet with great advice.read more
IT Managers Overwhelmed Fighting Cyberattacks - Sophos
A global survey, The Impossible Puzzle of Cybersecurity, carried out by Sophos reveals IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology.read more