The ‘BLESA’ flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said.
An attacker could pose as a company employee, invite customers or partners to meetings, then use socially engineered conversation to extract sensitive information.
Hackers can spoof messages, hijack screen controls and kick others out of meetings.
A glitch in the UX in Gmail allows the “from” field to be forged so there is no sender listed in the email’s header.
A flaw in Safari – that allows an attacker to spoof websites and trick victims into handing over their credentials – has yet to be patched.
LAS VEGAS – In recent years there has been more attention paid to the security of medical devices; however, there has been little security research done on the unique protocols used by these devices. Many of the insulin pumps, heart monitors and other gadgets found in hospital rooms use aging protocol to communicate with nurses’[…]