feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouIndiaIndia
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / Hackers Hijack Earbuds: Fast Pair Flaw Exposed

Hackers Hijack Earbuds: Fast Pair Flaw Exposed

15 Jan

•

Summary

  • Fast Pair protocol allows hackers to connect to millions of audio devices.
  • Researchers discovered vulnerabilities in 17 audio accessories from 10 companies.
  • Hackers can control microphones, audio, or track location within 50 feet.
Hackers Hijack Earbuds: Fast Pair Flaw Exposed

Researchers from KU Leuven University have revealed a significant security flaw in Google's Fast Pair wireless protocol, allowing for the hijacking of millions of Bluetooth audio devices. The vulnerabilities, collectively named WhisperPair, were found in 17 accessories from 10 different manufacturers. These flaws enable attackers within approximately 50 feet to silently pair with devices in under 15 seconds.

The exploit allows hackers to take control of microphones, listen to ambient sounds, disrupt audio streams or phone calls, and inject their own audio. In some cases, specifically with devices supporting Google's Find Hub feature, attackers can also track a user's location with high resolution. This poses a severe privacy risk, even for iPhone users.

Google has acknowledged the findings and is working with vendors to release security updates. However, researchers caution that due to infrequent updates for such devices, these vulnerabilities may persist for a considerable time, leaving millions of users exposed to potential spying and tracking.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
WhisperPair is a set of vulnerabilities found in Google's Fast Pair protocol that allows hackers to silently connect to and control Bluetooth audio devices.
Vulnerable devices include earbuds, headphones, and speakers from 10 different companies, including Sony, JBL, and Google itself, that use the Fast Pair protocol.
Hackers within Bluetooth range can hijack devices in seconds to control microphones, audio, or track the user's location without detection.

Read more news on

Technologyside-arrowGoogleside-arrow
trending

High Court bars term usage

trending

Indian stock market weak start

trending

IBPS PO SO result released

trending

HDFC Life Q3 earnings

trending

SmartCrete CRC decarbonising concrete

trending

BGMI 4.2 update released

trending

Kospi index hits record

trending

SOF NSO results declared

trending

Punjabi Olympiad winners announced

You may also like

New Lotion Repairs Sperm Motility Crisis

16 Dec, 2025 • 154 reads

article image

Helium Death: College Athlete's Tragic End Linked to TikTok Trend

14 Dec, 2025 • 121 reads

article image

Top Exam Organizer Quits Over Tough Suneung English Test

12 Dec, 2025 • 154 reads

article image

PU Embraces Heritage: Phulkari Jackets Replace Gowns

6 Dec, 2025 • 185 reads

article image

AI Trust Soars: Gemini 3 Tops Real-World Tests

4 Dec, 2025 • 116 reads

article image