Results for bluetooth

Industry Trends

Wi-Fi, IoT, and BYOD: Securing Complex Environments

The lack of control you have over your “edge” network makes your entire network vulnerable. This is why an integrated and cohesive approach to cybersecurity is critical to defend these new headless and BYOD device environments. And the reality is that if you really want security at the wireless access portion of your network, you need a topology that extends network security all the way to the endpoint device.

By Chris Hinsz May 01, 2018

Threat Research

Fortinet at Insomni'hack 2018

This year, Fortinet was again present at Insomni'hack in Geneva, Switzerland. I am particularly proud of Fortinet's Swiss Sales & SE team, which made a great effort to adjust to a hacking conference.

By Axelle ApvrilleMarch 28, 2018

Industry Trends

The Blessing and Curse of Automation

As data becomes the new currency of the digital marketplace, one of the biggest security challenges organizations face is the number and kinds of endpoint devices that need access to the network. Smartphones, laptops, Chromebooks, tablets, and IoT devices of every function and size, and belonging to both employees and consumers, now regularly connect to some segment of the network to access data.

By Aamir LakhaniMarch 27, 2018

Threat Research

BlueBorne: Technical Insight

BlueBorne affects devices supporting Bluetooth. As such, the PoC they demoed does not spread over Bluetooth: it takes control of a given Bluetooth victim. Apparently, the researchers said they locally created a botnet. But that was clearly a local inside test, and we have no details regarding the botnet's payload.

By Axelle ApvrilleSeptember 19, 2017

Threat Research

BlueBorne May Affect Billions of Bluetooth Devices

Bluetooth is one of the most widely deployed and used connectivity protocols in the world. Everything from electronic devices to smartphones uses it, as do a growing number of IoT devices. Now, a new Bluetooth exploit, known as BlueBorne, exploits a Bluetooth, making literally billions of devices potentially vulnerable to attack. BlueBorne is a hybrid Trojan-Worm malware that spreads thru the Bluetooth protocol. Because it includes worm-like properties, any infected system is also a potential carrier, and will actively search for vulnerable hosts....

By Aamir LakhaniSeptember 14, 2017

Industry Trends

IoT Security: Trickier Than You Think

In the new digital economy, access to data is critical. Meeting the shifting demands of consumers, monitoring and managing critical network and system components in real time, and creating algorithms to extract meaningful information from the Big Data these devices can generate are all necessary to compete in the new digital marketplace. Part of this digital transformation is the adoption of IoT devices and networks, which continue to be deployed in networks at an unprecedented rate.

By Phil Keeley, Peter NewtonSeptember 13, 2017

Threat Research

Reading Your Tracker's Battery Level With a Standard Bluetooth 4.0 USB Dongle

Quite strangely, there is no easy way to check the battery level of your Fitbit tracker. You can configure your profile to send you notifications when the battery is low, but that's about all. As I was researching Bluetooth Low Energy (BLE), I noticed however that Fitbit trackers do offer the standard Battery Service (0x180f) along with the (standard) Battery Level characteristic (0x2a19).

By Axelle ApvrilleDecember 09, 2016

Threat Research

Next Gen Lock: the Good, the Bad, and the Smart, Part II: Fortinet Analysis

Part II: Fortinet Analysis Developing our own opinion In part one of this two-part series, I provided an overview of smart lock technology and some of its vulnerabilities and risks. We also decided to ‘try our luck’ with the security of these solutions in the Fortinet FortiGuard Lab, so we ordered some random brand smart locks for testing. Two of our main vulnerability researchers, Tony Loi and Tien Phan, were able to do some in-depth analysis these last few weeks. Not only were they able to confirm the attacks demonstrated by...

By David MaciejakOctober 07, 2016

Threat Research

Next Gen Lock: the Good, the Bad, and the Smart, Part I: The Problem

Part I: The Problem About 4000 years ago, as we began the development of our modern way of life, people started to also want their own privacy and the ability to safeguard their possessions. The lock and key concept was created at that time. The first were made with hardwoods, then metals. Some were amazingly intricate. But eventually, they evolved to become the latest iteration of that ancient concept, something we have seen developing over the last few years: the smart lock. The key has been replaced by your smartphone or smartwatch, but the...

By David MaciejakOctober 06, 2016