Bluetooth Headphones Hit by Major Security Flaw — Sony, Bose, JBL Among Affected Brands
A newly discovered vulnerability in a popular Bluetooth chip has left millions of wireless headphones exposed to potential hijacking and surveillance, according to a joint report from Tom’s Guide and cybersecurity firm ERNW.
The Flaw
At the center of the issue is a Bluetooth System on a Chip (SoC) developed by Airoha, used in a wide range of consumer audio devices. ERNW researchers found that attackers can manipulate headphones without pairing, allowing them to:
- Read and write device RAM and flash memory
- Hijack trust relationships with phones and other connected devices
- View device activity, including currently playing media
- Access personal information, such as phone numbers and call metadata
- Eavesdrop on conversations via Bluetooth Classic vulnerabilities
Who’s Affected?
Brands and models confirmed as vulnerable include:
- Sony (14 models)
- Marshall (6 models)
- JBL (2 models)
- Bose QuietComfort Earbuds
- Jabra Elite 8 Active
- Jlab Epic Air Sport ANC
- Beyerdynamic Amiron 300
- EarisMax Bluetooth Auracast Sender
- MoerLabs EchoBeatz
- Teufel (1 model)
ERNW stresses the list is not exhaustive — many more devices likely use the Airoha chip without the manufacturer even knowing, due to outsourced component development.
Is There a Fix?
Yes, Airoha has released a patched Software Development Kit (SDK) to manufacturers in early June. However, ERNW reports that no fixed firmware has yet been publicly released by major brands as of this week.
How to Stay Safe
While exploitation requires attackers to be within 30 feet (10 meters) and possess high technical skills, the risk is real — especially in public areas. Tom’s Guide recommends:
- Update firmware as soon as fixes become available
- Disable Bluetooth when not in use
- Avoid using Bluetooth headphones in crowded public spaces
- Consider wired headphones for the most secure listening experience
Until firmware updates are confirmed and widely distributed, users are urged to exercise caution — and treat their wireless headphones as potential entry points for cyber intrusion.
Hundreds of Brother Printers Hit by Unfixable Security Flaw — Other Major Brands Also Affected
The cybersecurity world is dealing with a serious printer problem that — unlike your paper jam — cannot be resolved with a reboot. A report from Engadget, citing research by Rapid7, reveals that over 700 Brother printer models have been impacted by eight distinct security vulnerabilities, one of which is unpatchable.
The Core Issue
While firmware updates are available for seven of the vulnerabilities, one flaw (vulnerability #8) cannot be patched. According to Engadget:
“Attackers could generate the default admin password so long as they know the serial number of the printer.”
Once inside, bad actors could exploit unpatched vulnerabilities to:
- Retrieve sensitive information
- Crash the device
- Open unauthorized TCP connections
- Perform malicious HTTP requests
- Expose passwords for connected networks
Not Just Brother
Though Brother is the most affected manufacturer, 59 additional models from Fujifilm, Toshiba, Ricoh, and Konica Minolta are also vulnerable, according to the report.
How to Protect Yourself
- Update your firmware — Brother has released patches for 7 of the 8 flaws.
- Set firmware updates to automatic where possible.
- Change the default admin password immediately — especially critical, since the unfixable flaw allows attackers to derive it if left unchanged.
- Apply the same password hygiene to any device with a default password.
As printers become increasingly connected, the once-humble office device is now a potential security liability. Take action — or risk more than a paper jam.
List of Affected Printers (PDF)
AT&T Launches ‘Wireless Account Lock’ to Combat SIM Swapping Attacks
In a bid to strengthen security and protect customers from SIM swap scams, AT&T has introduced a new feature called Wireless Account Lock — a tool aimed at shielding user accounts from unauthorized changes. The announcement, reported by MacRumors, marks a proactive move in carrier-side account protection.
What is Wireless Account Lock?
Exclusively available through the myAT&T app, this new safeguard targets postpaid (contract) customers, preventing cybercriminals from hijacking phone numbers by impersonating the user in customer service calls — a tactic known as SIM swapping.
Once activated, Wireless Account Lock blocks:
- SIM card or eSIM changes
- Phone number transfers
- Device upgrades
- Billing or user detail modifications
- New line additions
- Phone number changes
To disable the lock and regain access to these features, physical control of the device and in-app action is required — a deliberate design to prevent remote social engineering attacks.
Why It Matters
SIM swapping gives attackers access to a victim’s phone number — and by extension, two-factor authentication (2FA) codes sent via SMS. That opens the door to breaches of email accounts, bank logins, and other sensitive data. As AT&T explains:
“Criminals put a lot of energy into getting your username and password… They send fraudulent emails and texts, and they even buy search ads to lure you to fake login pages.”
The carrier emphasized they will never call or text asking users to turn off Wireless Account Lock — any such message is a scam.
Available for More Than Just Postpaid
While the announcement centers on postpaid accounts, AT&T says prepaid and business customers also have Wireless Account Lock options, enhancing coverage across customer types.
More Than Just a Lock
In tandem with the new feature, AT&T is boosting its security messaging — urging users to adopt multifactor authentication (MFA) wherever possible. Recommendations include:
- Authenticator apps
- Hardware tokens
- Passkeys
Bottom Line
This isn’t a sales pitch for AT&T, but if you’re already a customer, Wireless Account Lock is a smart, opt-in defense against fraud — especially relevant in an age when identity theft isn’t always personal, just opportunistic.