7.Locks HexConnections

Billions of smartphones, tablets, laptops, and Linux-based IoT devices are now using Bluetooth software stacks that are potentially susceptible a new security flaw. Titled as BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.

For those who are not aware, the BLE is a compact version of the traditional Bluetooth that is designed to conserve battery power without compromising on the connections. The latest Bluetooth protocol is integrated into many devices for the same reason.

However, the broad adoption of BLE has alerted the security researchers and academics who are constantly highlighting the security flaws present in the system. Just recently, a research project went underway at the Purdue University where a team of seven investigated the ‘reconnection’ process of BLE.