[HackerNews] Researchers Propose Machine Learning-based Bluetooth Authentication Scheme

A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably.
Called “Verification of Interaction Authenticity” (aka VIA), the recurring authentication scheme aims to solve the problem of passive, continuous authentication and automatic deauthentication once

Source: Read More (The Hacker News)

You might be interested in …

[SecurityWeek] Sage X3 Vulnerabilities Can Pose Serious Risk to Organizations

All posts, Security Week

Researchers at cybersecurity firm Rapid7 have uncovered several vulnerabilities in the Sage X3 enterprise resource planning (ERP) product, including flaws that can be exploited remotely without authentication to take complete control of a system. read more Source: Read More (SecurityWeek RSS Feed)

Read More

[ThreatPost] The Top Ransomware Threats Aren’t Who You Think

All posts, ThreatPost

Move over REvil, Ragnar Locker, BlackMatter, Conti et al: Three lesser-known gangs account for the vast majority of ransomware attacks in the U.S. and globally. Source: Read More (Threatpost)

Read More

[SecurityWeek] US Exchanges Offer a Rich Potential Target for Hackers

All posts, Security Week

Cyberattacks have long been seen as a threat to financial markets, but worries are becoming even more acute following a US pipeline hack that set off a public panic and forced the company to pay a ransom. Financial exchanges that manage daily transactions of tens or hundreds of billions of dollars are an appealing target […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.