in

Google Bluetooth Security Key Flawed; Intel CPU Insecure! – ThreatWire



Hak5 — Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________
Bluetooth Security Keys? Bad Idea. Planes could be crashed, Zombie’s are after your CPUs! All that coming up now on ThreatWire. #threatwire #hak5

Links:
Support me on alternative platforms!

—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → https://www.hakshop.com
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆

Titan Security Key Hacked:
https://security.googleblog.com/2019/05/titan-keys-update.html
https://arstechnica.com/information-technology/2019/05/google-warns-bluetooth-titan-security-keys-can-be-hijacked-by-nearby-hackers/
https://www.cnet.com/news/google-warns-titan-security-key-has-bluetooth-bug-that-leaves-it-vulnerable/
https://www.cyberscoop.com/google-replace-titan-keys-free-uncovering-bluetooth-flaw/
https://www.zdnet.com/article/google-to-replace-faulty-titan-security-keys/
https://www.wired.com/story/bluetooth-complex-security-risk/

Radio aircraft navigation landing system hacked:
https://aanjhan.com/assets/ils_usenix2019.pdf
https://arstechnica.com/information-technology/2019/05/the-radio-navigation-planes-use-to-land-safely-is-insecure-and-can-be-hacked/
https://securityledger.com/2019/05/researchers-hack-aircraft-landing-system-with-600-radios/

RIDL In Intel (Zombieland):
https://www.cyberscoop.com/intel-chip-flaws-zombieland-ridl-fallout/
https://arstechnica.com/gadgets/2019/05/new-speculative-execution-bug-leaks-data-from-intel-chips-internal-buffers/
https://thehackernews.com/2019/05/intel-processor-vulnerabilities.html
https://www.zdnet.com/article/patch-status-for-the-new-mds-attacks-against-intel-cpus/
https://zombieloadattack.com/zombieload.pdf
https://zombieloadattack.com/
https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/
https://www.zdnet.com/article/how-to-test-mds-zombieload-patch-status-on-windows-systems/

Additional resources:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html
https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Photo credit:
https://www.flickr.com/photos/grmisiti/8149613310
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Share this: