#ant-bluetooth

[ follow ]
#bluetooth
Wearables
fromMakeUseOf
5 days ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
fromThe Verge
2 months ago
Information security

Sony, Anker, and other headphones have a serious Google Fast Pair security vulnerability

Wearables
fromMakeUseOf
5 days ago

Your phone's Bluetooth is broadcasting more than you think - here's how to limit it

Bluetooth remains active and broadcasts data even when not connected, potentially allowing for tracking without user consent.
fromThe Verge
2 months ago
Information security

Sony, Anker, and other headphones have a serious Google Fast Pair security vulnerability

#whatsapp
Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

Privacy professionals
fromTechCrunch
4 days ago

WhatsApp notifies hundreds of users who installed a fake app that was actually government spyware | TechCrunch

WhatsApp notified 200 users about a malicious fake app containing spyware created by Italian firm SIO.
fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

Wearables
fromGadgets 360
3 days ago

Samsung Galaxy 'Able' Reportedly Spotted in App, May Not Be Earphones

Samsung is likely launching a new accessibility-focused model called Galaxy Buds Able, indicated by its unique naming and model number.
Privacy technologies
fromZDNET
1 week ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Mobile UX
fromZDNET
1 week ago

Does your Android Auto keep disconnecting? What to do about it - for now

Android Auto users face connection issues, primarily with Pixel and Galaxy phones, with temporary fixes available.
#cybersecurity
fromTechCrunch
1 week ago
Information security

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Cyberattacks targeting Apple customers have emerged, utilizing hacking tools Coruna and DarkSword to steal data from iPhones and iPads.
fromMail Online
2 weeks ago
Information security

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Information security
fromTechCrunch
1 week ago

A major hacking tool has leaked online, putting millions of iPhones at risk. Here's what you need to know | TechCrunch

Cyberattacks targeting Apple customers have emerged, utilizing hacking tools Coruna and DarkSword to steal data from iPhones and iPads.
Information security
fromMail Online
2 weeks ago

FBI exposes three signs your smart devices have been secretly hijacked

Cybercriminals can hijack smart devices, leading to increased data usage and internet charges, while turning devices into part of a botnet.
Venture
from24/7 Wall St.
2 weeks ago

Broadcom Just Shipped the World's First Quantum-Safe Network Encryption - 3 Reasons AVGO Investors Should Pay Attention

Broadcom shipped the first quantum-safe network encryption solution embedded at the silicon level, positioning itself as a first-mover in a compliance-driven enterprise infrastructure upgrade cycle.
Apple
fromJezebel
2 weeks ago

Your iPhone Has Probably Never Been More Vulnerable to Spyware and Hacking

Apple iOS devices face increased cybersecurity threats from malware like Darksword and Coruna that exploit vulnerabilities to steal data and cryptocurrency from millions of users.
#android
fromZDNET
2 months ago
Gadgets

Your Android phone just got a powerful anti-theft upgrade - and I'm sighing in relief

fromZDNET
2 months ago
Gadgets

Your Android phone just got a powerful anti-theft upgrade - and I'm sighing in relief

Information security
fromThe Hacker News
1 week ago

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR

A malvertising campaign targets U.S. individuals searching for tax documents, delivering rogue installers that blind security programs using BYOVD techniques.
Privacy professionals
fromTheregister
2 weeks ago

Microsoft pushes out-of-band hotpatch for Bluetooth

Microsoft released an out-of-band hotpatch for Windows 11 to fix Bluetooth visibility issues preventing device connections and management in Settings.
Privacy technologies
fromWIRED
2 weeks ago

Signal's Creator Is Helping Encrypt Meta AI

Moxie Marlinspike's privacy platform Confer will integrate its encryption technology into Meta's AI systems to protect user data in AI conversations.
#android-security
Privacy technologies
fromComputerworld
1 month ago

3 Android theft protection additions you should absolutely activate

Android devices have built-in security layers and permission systems that prevent unauthorized app access to sensitive data without explicit user approval.
fromZDNET
1 month ago
Privacy technologies

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
fromTechzine Global
2 months ago
Information security

Critical Dolby leak in Android patched by Google

A buffer overflow (CVE-2025-54957) in Dolby UDC 4.5–4.13's DD+ decoder can leak data and is rated critical by Google.
Privacy technologies
fromThe Hacker News
2 weeks ago

Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse

Google is restricting non-accessibility apps from using Android's accessibility services API in Advanced Protection Mode to prevent malicious data theft.
Information security
fromTechRepublic
2 weeks ago

875 Million Android Phones Face Risk Due to Hidden Chip Flaw

A chip-level flaw in MediaTek-powered Android phones allows attackers to unlock devices and extract encrypted data within 60 seconds, affecting approximately 875 million devices.
Privacy technologies
fromComputerworld
1 month ago

3 Android theft protection additions you should absolutely activate

Android devices have built-in security layers and permission systems that prevent unauthorized app access to sensitive data without explicit user approval.
Privacy technologies
fromZDNET
1 month ago

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
#android-malware
Information security
fromThe Hacker News
2 weeks ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Information security
fromThe Hacker News
2 weeks ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Privacy technologies
fromTechRepublic
2 weeks ago

Truecaller Gives Families a Way to Stop Scam Calls Remotely - TechRepublic

Truecaller's Family Protection feature enables designated family members to remotely manage scam call defenses for up to five people, including the ability to end suspected fraud calls in real-time on Android devices.
Information security
fromWIRED
2 weeks ago

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild

A sophisticated iPhone hacking technique called DarkSword enables attackers to silently compromise iOS devices through infected websites, affecting hundreds of millions of users running older iOS versions.
fromThe Verge
1 month ago

Samsung's Digital Home Key lets you use your phone as your key

The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.
Mobile UX
Wearables
fromTechCrunch
1 month ago

A new app alerts you if someone nearby is wearing smart glasses | TechCrunch

Nearby Glasses is an Android app that detects Bluetooth signals from smart glasses and alerts users when recording devices are nearby, addressing privacy concerns about non-consensual surveillance.
#nato-security-certification
Privacy professionals
fromWIRED
1 month ago

Time to Ditch Your Ring Doorbell? Here Are the Best Privacy-Minded Alternatives

Video doorbell footage poses privacy risks through unauthorized access, government surveillance, and potential misuse for racial profiling, though legal protections exist for refusing police requests without warrants.
Privacy technologies
fromWIRED
4 weeks ago

This Jammer Wants to Block Always-Listening AI Wearables. It Probably Won't Work

Deveillance's Spectre device claims to detect microphones via RF emissions and NLJD technology, but experts dispute its effectiveness and question whether it can reliably identify all microphone types.
Privacy technologies
fromGSMArena.com
1 month ago

NordVPN call protection is now available on Android to flag potential scams

NordVPN launches call protection for Android users across multiple countries, warning about potential scam calls before answering by analyzing phone number reputation data.
#whisperpair
fromZDNET
2 months ago
Gadgets

Your Bluetooth earphones could be vulnerable to attack - here's what to do next

fromZDNET
2 months ago
Information security

Your Bluetooth earbuds are at risk of being hijacked - here's how to prevent it ASAP

fromZDNET
2 months ago
Gadgets

Your Bluetooth earphones could be vulnerable to attack - here's what to do next

fromZDNET
2 months ago
Information security

Your Bluetooth earbuds are at risk of being hijacked - here's how to prevent it ASAP

Information security
fromMail Online
1 month ago

Warning to iPhone users over hacking tool tied to government spyware

Coruna spyware targets iPhones running iOS versions from 2019 to late 2023, exploiting over 20 vulnerabilities to steal sensitive data without user awareness.
Information security
fromComputerWeekly.com
1 month ago

Zero-day in Android phone chips under active attack | Computer Weekly

A zero-day memory corruption vulnerability in Qualcomm chipsets affecting over 200 Android devices is actively exploited in the wild, requiring immediate security updates.
Apple
fromEngadget
1 month ago

How to know if an AirTag is tracking you

Unwanted tracking alerts notify when AirTags or similar Bluetooth trackers travel with a person, enabling detection and response on iPhone and Android.
Information security
fromTheregister
1 month ago

Kaspersky: No signs Coruna iPhone exploit kit made by US

Kaspersky disputes claims that the Coruna iPhone exploit kit shares authorship with a 2023 operation targeting Russian diplomats, stating no evidence of code reuse exists between them.
fromSecurityWeek
1 month ago

Android 17 Beta Strengthens Secure-by-Default Design for Privacy and App Security

The first, which aims to reduce risks associated with unencrypted traffic, is related to the usesCleartextTraffic attribute. On apps targeting Android 17, if the attribute is set to 'true' but lacks a corresponding network security configuration, cleartext traffic will be blocked by default. Developers are advised to migrate to network security configuration files for more granular control.
Software development
Information security
fromSecurityWeek
1 month ago

New 'AirSnitch' Attack Shows Wi-Fi Client Isolation Could be a False Sense of Security

Researchers discovered that client isolation in Wi-Fi networks can be bypassed on all tested routers due to missing standardization and inconsistent vendor implementations.
Information security
fromSecurityWeek
1 month ago

Android Update Patches Exploited Qualcomm Zero-Day

Google released Android security updates patching nearly 130 vulnerabilities, including an exploited zero-day in Qualcomm chipsets affecting over 200 devices through integer overflow in graphics components.
#smart-home-security
fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

#rcs
#smart-glasses-detection
fromFuturism
1 month ago
Privacy technologies

New App Detects the Radio Fingerprint of Smart Glasses and Warns You When Someone Is Using Them Nearby

fromFuturism
1 month ago
Privacy technologies

New App Detects the Radio Fingerprint of Smart Glasses and Warns You When Someone Is Using Them Nearby

#bluetooth-62
fromZDNET
1 month ago
Gadgets

Are your Bluetooth devices missing these key features? Here's why - and who to blame

fromZDNET
2 months ago
Gadgets

I sat down with Bluetooth reps at CES 2026 - and what they told me changed my perspective forever

fromZDNET
1 month ago
Gadgets

Are your Bluetooth devices missing these key features? Here's why - and who to blame

fromZDNET
2 months ago
Gadgets

I sat down with Bluetooth reps at CES 2026 - and what they told me changed my perspective forever

fromTravel + Leisure
1 month ago

Is Your Airplane Wi-Fi Really Safe? Security Experts Weigh In

In-flight Wi-Fi is roughly on par with hotel or airport Wi-Fi. It's not automatically unsafe, but it's not something you should blindly trust either. You're on a shared network with hundreds of other people, and you don't know how well it's segmented or monitored.
Privacy technologies
Gadgets
fromZDNET
2 months ago

I've tried countless tracker tags, and these are the best I've found for Android

Rolling Square's AirNotch Pro Dual tags provide cross-platform Find My and Google Find Hub compatibility, durable IP68 construction, long battery life, omnidirectional sound, and built-in key attachment.
fromMail Online
1 month ago

Warning to all iPhone users over new spyware attack stealing data

The tech giant said the threat stems from the vast majority of users not updating to the latest version of their phone software, known as iOS 26. The patch includes advanced security upgrades for the latest vulnerabilities that hackers have allegedly been using in real-world attacks. Specifically, they've exploited sneaky flaws in the part of the iPhone that handles web browsing, called WebKit.
Apple
Gadgets
fromZDNET
2 months ago

I replaced my AirTags with a Bluetooth tracker that's functional, long-lasting, and Android-friendly

AirNotch Pro Dual tags support Apple Find My and Google Find Hub, are rugged, include a built-in key loop, long-lasting batteries, and omnidirectional loud sound.
fromEngadget
2 months ago

How to pair AirPods with any device

AirPods work most smoothly with Apple hardware, but they also connect reliably to Android phones, Windows laptops and other Bluetooth devices. The pairing process depends on the platform in use although the basics remain the same. Once the AirPods are placed in pairing mode, most devices detect them quickly and handle the remaining steps in the background. The guide below explains how to pair AirPods with Apple products, how the process differs on newer iPhones that support H2 features
Apple
fromZDNET
1 month ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
fromThe Verge
2 months ago

Soon you can easily add Bluetooth Auracast to iPhones

It's developing a small disc-shaped transceiver - the splitR - that can attach to an iPhone's MagSafe and turn it into an Auracast device capable of either transmitting or receiving an Auracast broadcast. The company's connectR app, which will be available on both the Apple App Store and Google Play this coming summer, will allow you to see broadcasts around you, your connected devices, and create your own Auracast channels or group listening sessions.
Gadgets
fromZDNET
1 month ago

I created the ultimate Wi-Fi password key with the most unexpected gadget - how it works

I'm blown away that I can write data to a little chip and then access that using a phone or tablet. I've embedded NFC tags into all sorts of things, from documents to business cards to 3D-printed objects. And it's easy! What you'll need You need two things: NFC tags: These come in all sorts of shapes and sizes, from to to .
Gadgets
fromZDNET
1 month ago

Is spyware hiding on your phone? How to find out and remove it - fast

Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
Privacy technologies
fromZDNET
1 month ago

These Bluetooth trackers for Android users function even better than AirTags (and they're on sale)

The One Point is a fob that fits on a keyring or anything else you can think of attaching a fob to -- from your pet to your bike. It measures 1.49in/37.9mm and is 0.25in/6.4mm thin, and it is splashproof to the IPX5 standard. Powering the tiny fob is a user-replaceable CR2032 lithium coin cell that should last about a year. Regarding range, the fob is good to about 200ft/60m if you want to activate it to play a sound.
Gadgets
Information security
fromTheregister
2 months ago

Fast Pair flaw exposes Bluetooth devices to hijacking

A Fast Pair implementation flaw called WhisperPair lets attackers within Bluetooth range pair and control millions of wireless earbuds, headphones, and speakers without user interaction.
Privacy technologies
fromWIRED
2 months ago

Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking

Vulnerabilities in Fast Pair on 17 headphone and speaker models let attackers silently pair, hijack audio, access microphones, and enable precise location tracking.
#smartphone-privacy
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Information security
fromGSMArena.com
2 months ago

Google expands Android theft protection features

Android 16 expands theft protection with granular Failed Authentication Lock toggles, broader biometric coverage, longer lockouts, enhanced recovery tools, and default Remote Lock in Brazil.
Information security
fromTechCrunch
2 months ago

Android phones are getting more anti-theft features | TechCrunch

Android expands theft-protection: toggle for Failed Authentication Lock, longer lockouts, Identity Check covers all biometric apps, optional Remote Lock challenge, defaults enabled in Brazil.
fromZDNET
1 month ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
fromZDNET
2 months ago

Your phone is sharing data without your knowledge - how to stop it ASAP

Much of this information needs to be sent to the manufacturer to keep your device up to date and functioning properly. With that goal in mind, your phone might share any of the following tidbits: Device identifiers such as IMEI numbers, hardware serial numbers, and SIM details Telemetry data about the device's system status or health Service checks for push notifications and operating system updates Crash logs or diagnostic analytics The connectivity state, such as Wi-Fi vs. mobile Content updates, including news, social feeds, and synced emails
Privacy technologies
fromFast Company
1 month ago

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
Information security
fromPocket-lint
1 month ago

I block ads on my Android phone for free, and it only took 3 taps to set up

While it's impossible to irradiate all advertisements wholesale, there are ways to reduce their prevalence considerably. Notably, if you happen to have an smartphone or tablet, you can leverage a built-in setting called private DNS to block a great majority of ads across the entire system -- no apps or accounts required. Without getting too technical, Private DNS is a security feature that encrypts DNS queries (these play a role in translating website names into IP addresses).
Privacy technologies
Information security
fromZDNET
1 month ago

7 apps I use to lock down, encrypt, and store my private files - and most are free

Use dedicated file-and-folder security apps across devices, stay vigilant about sharing and access, and keep operating systems and apps up to date.
Information security
fromMedium
3 months ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, is essential as the last line of defense to protect sensitive personal data against modern cyber threats.
Information security
fromThe Hacker News
1 month ago

New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

ZeroDayRAT is a commercial mobile spyware platform enabling real-time surveillance, data exfiltration, and financial theft on Android and iOS via a seller-provided builder and control panel.
[ Load more ]