This Bluetooth Attack Can Steal a Tesla Model X in Minutes

This Bluetooth Attack Can Steal a Tesla Model X in Minutes

But one security researcher has shown how vulnerabilities in the Tesla Model X's keyless entry system allow a different sort of update: A hacker could rewrite the firmware of a key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.

A Bluetooth Flaw Leaves Billions of Devices Vulnerable

A Bluetooth Flaw Leaves Billions of Devices Vulnerable

The October issue of WIRED took a close , in-depth look at the state of election security.

Google and Apple Reveal How Covid-19 Alert Apps Might Look

Google and Apple Reveal How Covid-19 Alert Apps Might Look

If two people running the app spend a certain amount of time in proximity—say, 10 minutes within six feet, or whatever health care agencies dictate—their phones will both record each others' Bluetooth codes.

How Apple and Google Are Enabling Covid-19 Bluetooth Contact-Tracing

How Apple and Google Are Enabling Covid-19 Bluetooth Contact-Tracing

On Friday, the two companies announced a rare joint project to create the groundwork for Bluetooth-based contact-tracing apps that can work across both iOS and Android phones.

Bezos' $10B Climate Fund, Bluetooth Bugs, and More News

Bezos' $10B Climate Fund, Bluetooth Bugs, and More News

Researchers from Singapore University of Technology and Design discovered 12 new Bluetooth bugs that potentially expose more than 480 devices, from fitness trackers and smart locks to medical tools and implants.You can sign up right here to make sure you get the news delivered fresh to your inbox every weekday!

The New Version of Bluetooth Is Here to Fix Your Headphones

The New Version of Bluetooth Is Here to Fix Your Headphones

That LE stands for “low energy,” and the goal for the update is to allow a standard Bluetooth signal to better manage and share wireless audio streams between devices without overworking the batteries in your phone, your smartwatch, or your headphones.

Our Favorite Wirefree Earbuds Are Just $70 Right Now

Our Favorite Wirefree Earbuds Are Just $70 Right Now

The Stylish are also great on the inside, boasting AirPod-beating specs like 6.5 hours of battery life per charge, a sweat-resistant coating, and some of the best audio quality you'll find below the $200 mark, thanks to support for Bluetooth 5.0 and aptX audio.

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

Burglars Really Do Use Bluetooth Scanners to Find Laptops and Phones

A recent rise in laptop and gadget thefts from cars, particularly in San Francisco and the larger Bay Area, has left victims and police wondering if burglars are using Bluetooth scanners to choose target cars based on which have gadgets inside emitting wireless signals.

Facebook's Voice Transcripts Were More Invasive Than Amazon's

Facebook's Voice Transcripts Were More Invasive Than Amazon's

Researchers from the security firm Pen Test Partners published findings this week that an attacker would just need a person's username to track them.A new vulnerability and corresponding exploit of Bluetooth could allow an attacker to determine the encryption keys used during device pairing and let themselves in on the party.

Palantir Manual Shows How Law Enforcement Tracks Families

Palantir Manual Shows How Law Enforcement Tracks Families

Security News this Week: Palantir Manual Shows How Law Enforcement Tracks Families. If you happened to buy the Blue Smart hair straightener from Glamorizer—perhaps not even realizing it had Bluetooth capability, because why would it?—then TechCrunch is sorry to report but hackers could totally seize your device, and well, change the temperature of the hot iron remotely, if they wanted to.

The Clever Cryptography Behind Apple's 'Find My' Feature

The Clever Cryptography Behind Apple's 'Find My' Feature

In a background phone call with WIRED following that keynote, Apple broke down that privacy element, explaining how its "encrypted and anonymous" system avoids leaking your location data willy nilly, even as your devices broadcast a Bluetooth signal explicitly designed to let you track your device.

Bluetooth's Complexity Has Become a Security Risk

Bluetooth's Complexity Has Become a Security Risk

"One major reason Bluetooth is involved in so many cases is just how complex this protocol is," says Ben Seri, one of the researchers who discovered BlueBorne and vice president of research at the embedded device security firm Armis.

Google Recalls Titan Security Key Over a Bluetooth Flaw

Google Recalls Titan Security Key Over a Bluetooth Flaw

With the right timing, she could trick the victim's laptop, for instance, into pairing with her own Bluetooth dongle rather than the Titan key, thus gaining access to both a user's Google account and that computer.

One of Our Favorite Google Speakers Is Half Off Right Now

One of Our Favorite Google Speakers Is Half Off Right Now

It's a Google Home speaker that lets you speak to a voice assistant hands-free, like all of the best smart speakers these days. WIRED: The Link 20 is merges the convenience and portability of the best Bluetooth speakers and the new generation of smart speakers for the home.

Don’t Get Your Valentine an Internet-Connected Sex Toy

Don’t Get Your Valentine an Internet-Connected Sex Toy

“Even simply opening the Bluetooth explorer on your phone will reveal nearby smart adult devices that are powered on.” When Bluetooth is used to hack into and take over a sex toy, it’s called “screwdriving”—a term coined by Pen Test Partners in 2017, when its researchers discovered that the Lovense Hush butt plug could be found and remotely controlled via Bluetooth.

Nike's New Self-Lacing Basketball Shoe Is Actually Smart

Nike's New Self-Lacing Basketball Shoe Is Actually Smart

I can hold down a button in the shoe's midsole, or I can use a new Nike app called Adapt, which pairs with the lacing engine via Bluetooth and lets you adjust the left and right sneakers independently.

The WIRED Guide to 5G

The WIRED Guide to 5G

The FCC regulates who can use which ranges, or bands, of frequencies to prevent users from interfering with each other’s signals.Low-Band FrequenciesBands below 1 GHz traditionally used by broadcast radio and television as well as mobile networks; they easily cover large distances and travel through walls, but those are now so crowded that carriers are turning to the higher range of the spectrum.Mid-Band SpectrumThe range of the wireless spectrum from 1 GHz to 6 GHz, used by Bluetooth, Wi-Fi, mobile networks, and many other applications.

How Would NYC's Anti-AirDrop Dick Pic Law Even Work?

How Would NYC's Anti-AirDrop Dick Pic Law Even Work?

"Cyber flashing," a type of digital harassment where creeps use Apple's AirDrop feature to send dick pics and other lewd images straight to the home screens of unsuspecting strangers via Bluetooth and Wi-Fi.The bill’s co-sponsors, council members Joseph Borelli and Donovan Richards, say it's about time cyber flashers faced the same consequences as their offline counterparts.

Waze Uses Beacons to Untangle Chicago’s Baffling Streets

Waze Uses Beacons to Untangle Chicago’s Baffling Streets

As of this month, the multi-level streets of Chicago are studded with Waze Beacons, hockey puck-sized squares that stick to the sides of tunnel walls and broadcast an open standard signal via Bluetooth so Waze and other navigation apps can triangulate a position.