WhatsApp: A WhatsApp failure causes 300,000 mobile numbers to be published
Cybersecurity: A critical Windows flaw puts the security of computers around the world at risk
It's called
BLURtooth,
and it's a problem that can
throw off
cybersecurity experts around the world.
This is an important
security flaw that cannot be fixed at the moment
and that has been officially notified by the organization responsible for the bluetooth communication standard.
The ruling was
discovered by two groups of
independent
scholars
, École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University.
The security flaw is quite sophisticated and
uses a key component of Bluetooth
, called Cross-Transparant Key Derivation, or CTKD, to intercept the information transmitted by Bluetooth between all devices without them being aware of what is happening in the background.
BLURtooth is very sophisticated in that it
uses the standard identification keys
, which determine how the two devices should communicate (by BLE, or Bluetooth Low Energy; or by BR / EDR or Basic Rate / Enhanced Date Rate) to sneak in where they don't. should.
An attacker could manipulate the CTKD component to swap the BLE or BR / EDR communication keys with other keys that
can be exploited to access the transmitted information
.
From computers to tablets, through mobile phones or smart watches,
billions of devices are susceptible to being attacked
in this way if they work with the Bluetooth 4.0 or Bluetooth 5.0 standard, so the number of people affected by the failure is immense.
Virtually all devices launched in the last ten years are susceptible to being attacked in this way.
The problem is even greater if we take into account that those responsible for the Bluetooth standard
still do not have an update system ready to solve it
and do not know when they will be able to block the failure.
They do promise that they will solve the problem and that sooner or later the devices will be safe again, but for now, they ask for caution for users.
Since only Apple, Samsung, Google and a handful of other companies are up to date with software updates, and since implementing this security solution, when it arrives,
will depend on each mobile manufacturer
, the failure may never be resolved on phones with more than one year of life.
According to the criteria of The Trust Project
Know more
Google
Samsung
TricksHow to record your mobile screen on iPhone or Android
Gadgets Samsung Galaxy Note 20 Ultra review: the best and the most expensive
PresentationGalaxy Z Fold 2, Samsung's most unique and futuristic mobile
See links of interest
Last News
TV programming
English translator
Work calendar
Daily horoscope
Santander League Standings
League schedule
Movies TV
Topics
Sheffield United - Wolverhampton Wanderers
Brighton and Hove Albion - Chelsea