D•Scribe
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Pro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 7 days ago

Bluetooth flaws could let hackers spy through your microphone

insinuator.net

external-link
message-square
0
link
fedilink
  • cross-posted to:
  • cybersecurity@infosec.pub
  • cybersecurity@sh.itjust.works
16
external-link

Bluetooth flaws could let hackers spy through your microphone

insinuator.net

Pro@programming.dev to Cybersecurity@sh.itjust.worksEnglish · 7 days ago
message-square
0
link
fedilink
  • cross-posted to:
  • cybersecurity@infosec.pub
  • cybersecurity@sh.itjust.works
Security Advisory: Airoha-based Bluetooth Headphones and Earbuds
insinuator.net
external-link
Important note: Some media coverage on this topic falsely or inaccurately depicts the attack conditions. To be clear: Any vulnerable device can be compromised if the attacker is in Bluetooth range. That is the only precondition. During our research on Bluetooth headphones and earbuds, we identified several vulnerabilities in devices that incorporate Airoha Systems on a Chip (SoCs). In t ...
alert-triangle
You must log in or # to comment.

Cybersecurity@sh.itjust.works

cybersecurity@sh.itjust.works

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cybersecurity@sh.itjust.works

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

  • Be respectful. Everyone should feel welcome here.
  • No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
  • No Ads / Spamming.
  • No pornography.

Community Rules

  • Idk, keep it semi-professional?
  • Nothing illegal. We’re all ethical here.
  • Rules will be added/redefined as necessary.

If you ask someone to hack your “friends” socials you’re just going to get banned so don’t do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 144 users / day
  • 490 users / week
  • 1.28K users / month
  • 4.6K users / 6 months
  • 1 local subscriber
  • 7.8K subscribers
  • 2.61K Posts
  • 3.9K Comments
  • Modlog
  • mods:
  • Kid@sh.itjust.works
  • Lanky_Pomegranate530@midwest.social
  • UI: unknown version
  • BE: 0.19.12
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org