HackDig : Dig high-quality web security articles for hacker

BlueBorne- the lethal attack to take over your devices

The latest attack Blueborne is taking over by storm , lets read about it in concise, the attack method and the details of this bug. A series of vulnerabilities have been unearthed in the implementation of Bluetooth which allows hackers to take over your computers/ tablets/ smartphones whenever Bluetooth is on. A total of eight critical Bluetooth vulnerabilit
Publish At:2017-09-13 14:25 | Read:2769 | Comments:0 | Tags:News blueborne bluetooth hacking hacking IOT

Billions of mobile, desktop and IoT devices potentially exposed to BlueBorne Attack

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition for BlueBorne attacks is that targeted devices must have Bluetooth enabled. The new attack technique, dubbed BlueBorne, was devised by experts with Armis Labs. Researchers have discovered a
Publish At:2017-09-13 09:25 | Read:2849 | Comments:0 | Tags:Breaking News Hacking Mobile BlueBorne attack Bluetooth hack

BTCrawler – Bluetooth Diagnostic & Discovery Tool

BTCrawler is an application used to to discover Bluetooth devices and the services they provide, it is useful if you wish to know which Bluetooth enabled devices are in your proximity for debugging, spying, curiosity or any other purpose.With this program you’ll be even able to find every service provided by those devices and to list all its Bluetooth
Publish At:2015-06-27 19:30 | Read:4098 | Comments:0 | Tags:Hacking Tools Network Hacking bluetooth bluetooth device dis

BlueScan – A Bluetooth Device Scanner

BlueScan is a BASH script that acts as a Bluetooth device scanner. It’s a tool designed to detect Bluetooth devices within the radio range of your system and extract as much information as possible from the devices without the requirement to pair.The tool works unobtrusively, ie without establishing a connection to the devices found and undetected. No
Publish At:2015-01-11 00:00 | Read:4566 | Comments:0 | Tags:Hacking Tools Network Hacking bluescan bluescanner bluetooth

Smartwatch Hacked... Data Exchange with Smartphone Not So Secure

We are living in an era of smart devices that we sync with our smartphones and make our lives very simple and easy, but these smart devices that inter-operates with our phones could leave our important and personal data wide open to hackers and cybercriminals.Security researchers have demonstrated that the data sent between a Smartwatch and an Android smartp
Publish At:2014-12-11 14:40 | Read:4032 | Comments:0 | Tags:Android Android Lollipop Android Smartwatch Bluetooth hackin


Share high-quality web security related articles with you:)


Tag Cloud