Google Bluetooth Security Key Flawed; Intel CPU Insecure! - ThreatWire

Published: May 21, 2019, 5 p.m.

Bluetooth Security Keys? Bad Idea. Planes could be crashed, Zombie’s are after your CPUs! All that coming up now on ThreatWire. #threatwire #hak5

Links:Support me on alternative platforms! https://snubsie.com/support

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆Our Site → https://www.hak5.orgShop → https://www.hakshop.comSubscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1Support → https://www.patreon.com/threatwireContact Us → http://www.twitter.com/hak5Threat Wire RSS → https://shannonmorse.podbean.com/feed/Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubsHost: Darren Kitchen → https://www.twitter.com/hak5darrenHost: Mubix → http://www.twitter.com/mubix-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

Titan Security Key Hacked:https://security.googleblog.com/2019/05/titan-keys-update.htmlhttps://arstechnica.com/information-technology/2019/05/google-warns-bluetooth-titan-security-keys-can-be-hijacked-by-nearby-hackers/https://www.cnet.com/news/google-warns-titan-security-key-has-bluetooth-bug-that-leaves-it-vulnerable/https://www.cyberscoop.com/google-replace-titan-keys-free-uncovering-bluetooth-flaw/https://www.zdnet.com/article/google-to-replace-faulty-titan-security-keys/https://www.wired.com/story/bluetooth-complex-security-risk/

Radio aircraft navigation landing system hacked:https://aanjhan.com/assets/ils_usenix2019.pdfhttps://arstechnica.com/information-technology/2019/05/the-radio-navigation-planes-use-to-land-safely-is-insecure-and-can-be-hacked/https://securityledger.com/2019/05/researchers-hack-aircraft-landing-system-with-600-radios/

RIDL In Intel (Zombieland):https://www.cyberscoop.com/intel-chip-flaws-zombieland-ridl-fallout/https://arstechnica.com/gadgets/2019/05/new-speculative-execution-bug-leaks-data-from-intel-chips-internal-buffers/https://thehackernews.com/2019/05/intel-processor-vulnerabilities.htmlhttps://www.zdnet.com/article/patch-status-for-the-new-mds-attacks-against-intel-cpus/https://zombieloadattack.com/zombieload.pdfhttps://zombieloadattack.com/https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/https://www.zdnet.com/article/how-to-test-mds-zombieload-patch-status-on-windows-systems/

Additional resources:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.htmlhttps://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Photo credit:https://www.flickr.com/photos/grmisiti/8149613310