At CES 2026, Motorola's Moto Tag 2 demonstrated how Channel Sounding, for faster device discovery and secure connections, and Ultra-Wideband (UWB), for precise location tracking, can work together to ...
Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer. BLE is a slimmer version of the ...
Meet the BlueBorne attack vector; patch or turn off Bluetooth, as this is a wormable threat that spreads through the air without requiring user interaction. What spreads through the air, is invisible ...
The “BLURtooth” flaw allows attackers within wireless range to bypass authentication keys and snoop on devices utilizing implementations of Bluetooth 4.0 through 5.0. A high-severity Bluetooth ...