Skip to content

Main Navigation

Thyrasec Logo Thyrasec
  • Home
  • Services
    • Bluetooth Security
    • Product Penetration Testing
    • Medical Device Security
    • Reverse Engineering
  • Blog
  • About
  • Contact

Author: Thyrasec

Profile picture of Thyrasec

Posts by Thyrasec

Stealing Teslas with Wireless – Car Keyless Entry

May 24, 2024

Keyless Entry technology, like the one installed in Tesla vehicles, is designed to make it easier …

Read More from Stealing Teslas with Wireless – Car Keyless Entry

Posted in NewsTagged Automotive, Bluetooth, Bluetooth LE, Relay Attacks

Hacker’s Guide to J-Link Debuggers

May 18, 2024

The J-Link debugger sold by Segger is a debugger probe for ARM Cortex-M processors like the …

Read More from Hacker’s Guide to J-Link Debuggers

Posted in GuideTagged Hardware, Reverse engineering

A Guide to Bluetooth Man-In-The-Middle (MITM)

May 11, 2024

One of the more challenging aspects of Bluetooth security is dealing with practical attacks. Man-In-The-Middle attacks …

Read More from A Guide to Bluetooth Man-In-The-Middle (MITM)

Posted in GuideTagged Bluetooth, Bluetooth Classic, Bluetooth LE, MITM, Security

Integrating MbedTLS by Example

May 1, 2024

Adding MbedTLS to your project is a great way to leverage a library designed to help …

Read More from Integrating MbedTLS by Example

Posted in GuideTagged Encryption, MbedTLS, Security

Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

February 13, 2024

We’ve seen a lot of attacks against Bluetooth and BLE over the last few years. Some …

Read More from Reviewing BLE and Bluetooth Vulnerabilities and Attacks of 2023

Posted in General

Top 6 Bluetooth Vulnerabilities

February 11, 2024

Over the last few years we’ve seen a slew of vulnerabilities found in Bluetooth and Bluetooth …

Read More from Top 6 Bluetooth Vulnerabilities

Posted in VulnerabilityTagged Bluetooth, Bluetooth Classic, Bluetooth LE, Security1 Comment on Top 6 Bluetooth Vulnerabilities

Medical Device Cybersecurity

January 30, 2024

Medical device cybersecurity is a critical aspect of healthcare technology, aimed at protecting medical devices and …

Read More from Medical Device Cybersecurity

Posted in GeneralTagged Medical Devices, Security

Using OpenSSL for Securing Bluetooth and Wireless Devices

January 28, 2024

In the rapidly evolving world of embedded systems, security has become a paramount concern. With the …

Read More from Using OpenSSL for Securing Bluetooth and Wireless Devices

Posted in GuideTagged Embedded, OpenSSL, Security

Building BlueZ – For Defense and Offense

January 19, 2024

What’s BlueZ BlueZ is an open-source Bluetooth stack implementation for Linux-based operating systems. The stack implementation …

Read More from Building BlueZ – For Defense and Offense

Posted in GuideTagged Bluetooth, Bluetooth Classic, Bluetooth LE, bluez

Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

January 18, 2024

2024 has barely started, and a researcher has already publicly disclosed several vulnerabilities related to Bluetooth …

Read More from Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data

Posted in VulnerabilityTagged Attack, Bluetooth, Bluetooth Classic, HID

Posts navigation

  • 1
  • 2
  • »

Share

Subscribe to receive the latest expert news about wireless security

/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */

Other Blog Posts

  • Stealing Teslas with Wireless - Car Keyless Entry

  • Hacker's Guide to J-Link Debuggers

  • A Guide to Bluetooth Man-In-The-Middle (MITM)

  • Integrating MbedTLS by Example

Search

Posts Tags

Attack Automotive BinWalk BLE Bluetooth Bluetooth Classic Bluetooth LE bluez Cryptography DDOS EEPROM Embedded EMMC Encryption Firmware Flash Flipper Zero Ghidra Hardware HID MbedTLS Medical Devices MITM OpenSSL OTA Pairing Relay Attacks Reverse engineering SDR Security Tools Wireless
Logo Thyrasec
Thyrasec is leading the charge in securing wireless connected devices with cutting-edge testing and solutions to protect next generation products from evolving wireless cybersecurity threats.
Thyrasec
  • Home
  • Blog
  • About
  • Contact
Services
  • Bluetooth Security
  • Penetration Testing
  • Medical Device Security
  • Reverse Engineering
Subscribe
/* real people should not fill this in and expect good things - do not remove this or risk form bot signups */
Copyright © 2023-2025 Thyrasec LLC. All Rights Reserved
Terms of ServicePrivacy Policy
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}