At CES 2026, Motorola's Moto Tag 2 demonstrated how Channel Sounding, for faster device discovery and secure connections, and Ultra-Wideband (UWB), for precise location tracking, can work together to ...
Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer. BLE is a slimmer version of the ...
The “BLURtooth” flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0. A high-severity Bluetooth ...
Meet the BlueBorne attack vector; patch or turn off Bluetooth, as this is a wormable threat that spreads through the air without requiring user interaction. What spreads through the air, is invisible ...