 
      
    | You are here | github.blog | ||
| | | | | insinuator.net | |
| | | | | Nowadays, Bluetooth is an integral part of mobile devices. Smartphones interconnect with smartwatches and wireless headphones. By default, most devices are configured to accept Bluetooth connections from any nearby unauthenticated device. Bluetooth packets are processed by the Bluetooth chip (also called a controller), and then passed to the host (Android, Linux, etc.). Both, the firmware on ... | |
| | | | | securitylab.github.com | |
| | | | | Improper validation of input data can lead to freed memory being accessible from the GPU, which can lead to arbitrary memory access. | |
| | | | | www.riscure.com | |
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | | www.pcworld.com | |
| | | There is a serious security flaw in billions of Intel CPUs that can let attackers steal confidential data like passwords and encryption keys. Firmware updates can fix it, but at a potential significant performance loss. | ||