We at @Tarlogic have discovered, using our #BSAM guide, the high impact CVE-2024-58101, according to MITRE, which allows the pairing of Samsung Galaxy Buds and Buds 2 devices without users' consent.
https://www.tarlogic.com/blog/cve-2024-58101/
We at @Tarlogic have discovered, using our #BSAM guide, the high impact CVE-2024-58101, according to MITRE, which allows the pairing of Samsung Galaxy Buds and Buds 2 devices without users' consent.
https://www.tarlogic.com/blog/cve-2024-58101/
How can #BSAM be used to detect Bluetooth vulnerabilities in our everyday devices? @antoniovazquezblanco, an engineer from the @Tarlogic Innovation team, explains it in this video, which was recorded during @rootedcon Panama.
https://youtu.be/VFcsHFsnHFc?si=vIrS1NzpgWi0BW4K
Bluetooth is a hole, and the time has come to plug it. Our colleague @antonvblanco has just made this very clear at the @rootedcon Panama.
How can you audit the security of #Bluetooth devices? @antoniovazquezblanco, engineer of the @Tarlogic Innovation team, will explain how the #BSAM methodology works this Friday at @rootedcon Panama.
"Vozes da Alvorada" - trabalho feito em parceria com Disco Duro para a exibição "The Democracy Project". Parte do evento "Fall of the Weimar Republic: Dancing on the Precipice", realizado pelo Carnegie Hall
https://artsandculture.google.com/story/xgVhxjGjRrp11w
#BlueSpy is a proof of concept that allows exploiting vulnerabilities in Bluetooth headsets and the spying on conversations. Jesús Mª Gómez, from the @Tarlogic Innovation team, explains how to identify vulnerabilities using #BSAM and how BlueSpy works.
https://www.tarlogic.com/blog/bluespy-spying-on-bluetooth-conversations/
What if a Bluetooth device manages to impersonate your phone? Could it connect to your headset? Could someone else listen in on your conversations? #BSAM helps to remedy these vulnerabilities 👇
https://www.tarlogic.com/bsam/controls/bluetooth-authentication/
How can Bluetooth devices be audited and secured? @antonvblanco and Jesús Mª Gómez Moreno are going to present at the @rootedcon #BSAM, the Bluetooth security methodology that helps developers design more secure devices 👇
How do you test a Bluetooth device for vulnerabilities that affect its pairing process with other devices? #BSAM, the first Bluetooth security methodology, establishes ten checks to audit this critical phase 👇
Is a Bluetooth device secure during the discovery phase? #BSAM, the first Bluetooth security methodology, includes six technical checks to verify that a device is not vulnerable in this phase 👇🏼
What is the first phase of a Bluetooth security assessment? Discover how to collect information about a device's Bluetooth components using #BSAM controls, @Tarlogic's methodology for analyzing this global standard ⬇️
https://www.tarlogic.com/bsam/controls/bluetooth-information-gathering/
Attack computers via mice or listen to conversations via smart speakers. Gearrice unpacks the security risks detected by @Tarlogic in developing #BSAM, the first methodology for auditing Bluetooth connections 👇🏼
https://www.gearrice.com/update/if-you-connect-your-devices-via-bluetooth-they-will-be-able-to-access-all-your-data/
#BSAM is the acronym for #Bluetooth #Security #Assessment #Methodology. BSAM is an open and collaborative methodology developed to standardize the security evaluation of devices using Bluetooth technology.
🖱 Did you know that your wireless mouse can be spoofed to take control of your computer? The @Tarlogic Innovation team has developed #BSAM, the first methodology to audit #Bluetooth devices and avoid situations like that 👇
https://www.tarlogic.com/news/bsam-bluetooth-security-assessment/
The Black Speculative Arts Movement is a global community of intellectuals from the African Diaspora that seek to present, promote, and support human centered speculative imagination to catalyze streams of new thought that envision an inclusive future society: https://www.bsam-art.com/
#blackspeculativeartsmovement #speculativearts #bsam #art #afrofuturism