We at @Tarlogic have discovered, using our #BSAM guide, the high impact CVE-2024-58101, according to MITRE, which allows the pairing of Samsung Galaxy Buds and Buds 2 devices without users' consent.
https://www.tarlogic.com/blog/cve-2024-58101/
CVE-2024-58101

Samsung Galaxy Buds and Galaxy Buds 2 are earphones that are pairable by default without requiring user interaction or a way to avoid it.

Tarlogic Security
How can #BSAM be used to detect Bluetooth vulnerabilities in our everyday devices? @antoniovazquezblanco, an engineer from the @Tarlogic Innovation team, explains it in this video, which was recorded during @rootedcon Panama.
https://youtu.be/VFcsHFsnHFc?si=vIrS1NzpgWi0BW4K
Demistifying Bluetooth security - Antonio Vázquez (Tarlogic)

YouTube

Bluetooth is a hole, and the time has come to plug it. Our colleague @antonvblanco has just made this very clear at the @rootedcon Panama.

#BSAM #BlueSpy #BluetoothWallOfShame #STICPANAMÁ

How can you audit the security of #Bluetooth devices? @antoniovazquezblanco, engineer of the @Tarlogic Innovation team, will explain how the #BSAM methodology works this Friday at @rootedcon Panama.

Wireless headsets from major manufacturers can be hacked. French portal @jvcom reports on @Tarlogic research that has detected vulnerabilities in dozens of Bluetooth devices employing #BSAM methodology 👇

https://www.jeuxvideo.com/news/1865783/si-vous-utilisez-des-ecouteurs-sans-fil-mefiez-vous-les-hackers-peuvent-totalement-ecouter-et-enregistrer-toutes-vos-conversations-privees.htm

Si vous utilisez des écouteurs sans-fil, méfiez-vous ! Les hackers peuvent totalement écouter et enregistrer toutes vos conversations privées

Tarlogic Security a démontré la possibilité de pirater des écouteurs sans fil via Bluetooth, activant discrètement le microphone pour écouter à distance les conversations des utilisateurs. Cette révélation souligne les risques de sécurité liés à l'utilisation généralisée des technologies sans f...

jeuxvideo.com

"Vozes da Alvorada" - trabalho feito em parceria com Disco Duro para a exibição "The Democracy Project". Parte do evento "Fall of the Weimar Republic: Dancing on the Precipice", realizado pelo Carnegie Hall
https://artsandculture.google.com/story/xgVhxjGjRrp11w

#BSAM #Afrofuturism #generativeart

This visual exhibition explores the intellectual, social, and cultural impact of the Weimar Republic on the African diaspora

This visual exhibition explores the intellectual, social, and cultural impact of the Weimar Republic on the African diaspora

Google Arts & Culture
#BlueSpy is a proof of concept that allows exploiting vulnerabilities in Bluetooth headsets and the spying on conversations. Jesús Mª Gómez, from the @Tarlogic Innovation team, explains how to identify vulnerabilities using #BSAM and how BlueSpy works.
https://www.tarlogic.com/blog/bluespy-spying-on-bluetooth-conversations/
BlueSpy - Spying on Bluetooth conversations

BlueSpy is a proof of concept for exploiting vulnerabilities in Bluetooth headsets and eavesdropping on private conversations

Tarlogic Security

What if a Bluetooth device manages to impersonate your phone? Could it connect to your headset? Could someone else listen in on your conversations? #BSAM helps to remedy these vulnerabilities 👇

https://www.tarlogic.com/bsam/controls/bluetooth-authentication/

Authentication

BSAM security methodology controls focused on the Bluetooth device authentication process

BSAM

How can Bluetooth devices be audited and secured? @antonvblanco and Jesús Mª Gómez Moreno are going to present at the @rootedcon #BSAM, the Bluetooth security methodology that helps developers design more secure devices 👇

https://www.rootedcon.com/rooted2024-en/#speakers

RootedCON

Security Congress in Madrid, Valencia & Malaga

RootedCON

How do you test a Bluetooth device for vulnerabilities that affect its pairing process with other devices? #BSAM, the first Bluetooth security methodology, establishes ten checks to audit this critical phase 👇

https://www.tarlogic.com/bsam/controls/bluetooth-pairing/

Pairing

Bluetooth BSAM security controls associated with the device pairing process

BSAM