Close Menu
Gadget Guide News
  • Home
  • News
  • Features
  • Reviews
  • Best Stuff
  • Buying Guides
  • Deals

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Trending

I saw the future of retail, and it’s all AI

January 17, 2026

600,000 Trump Mobile phones sold? There’s no proof.

January 17, 2026

Google is appealing a judge’s search monopoly ruling

January 16, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Gadget Guide News
Subscribe
  • Home
  • News
  • Features
  • Reviews
  • Best Stuff
  • Buying Guides
  • Deals
Gadget Guide News
  • Best Stuff
  • Buying Guides
  • Reviews
  • Deals
  • Features
Home»News»Google Fast Pair security flaw allowed for easy eavesdropping on Android users
News

Google Fast Pair security flaw allowed for easy eavesdropping on Android users

News RoomBy News RoomJanuary 15, 2026013 Mins Read
Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Google has acknowledged a Fast Pair flaw that theoretically enabled hackers to hijack the Bluetooth connection between mobile devices and headphones to track and eavesdrop on unsuspecting victims.

Security researchers in Belgium discovered a security vulnerability that allowed them to access the microphones on, for instance, a pair of wireless headphones and access the location of the users. This worked even if the audio device was already paired to the user’s phone running on Android.

A Wired report reveals the vulnerability was found with 17 models from 10 companies – Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and even Google.

The researchers from KU Leuven University Computer Security and Industrial Cryptography group told Wired all that was required was to be in Bluetooth range of the victim with access to the model number. Not the unique serial number, just the commonly accessible model number. Google says there’s no evidence the exploit had been used in the wild, but that doesn’t make the vulnerability – Christened WhisperPair by the researchers – any less alarming.

According to the search and mobile giant, it’s all down to an error in how some of Google’s hardware partners are implementing the Fast Pair technology, which is supposed to provide ease of uniting mobile devices with their accessories, as the name would suggest.

“You’re walking down the street with your headphones on, you’re listening to some music. In less than 15 seconds, we can hijack your device,” KU Leuven researcher Sayon Duttagupta told Wired. “Which means that I can turn on the microphone and listen to your ambient sound. I can inject audio. I can track your location.”

Google said it partnered with the researchers to fix the vulnerabilities, which have been addressed through firmware updates for the headphones themselves.

In a statement to Engadget, Google said: “We appreciate collaborating with security researchers through our Vulnerability Rewards Program, which helps keep our users safe.”

“We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting. As a best security practice, we recommend users check their headphones for the latest firmware updates. We are constantly evaluating and enhancing Fast Pair and Find Hub security.”

So, if you haven’t checked your headphones for an update lately, and you’re operating on an Android phone, now might be a good opportunity.

Read the full article here

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
News Room
  • Website

Related Posts

I saw the future of retail, and it’s all AI

January 17, 2026

600,000 Trump Mobile phones sold? There’s no proof.

January 17, 2026

Google is appealing a judge’s search monopoly ruling

January 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Articles

Operation Bluebird wants to reclaim Twitter’s ‘abandoned’ trademarks for a new social network

December 10, 2025

Meta had a 17-strike policy for sex trafficking, former safety leader claims

November 24, 2025

Naya Connect is a modular mechanical keyboard system for the indecisive

January 14, 2026
Latest Reviews

Kodak’s collectible Charmera is a terrible camera I somehow don’t hate

News RoomJanuary 16, 2026

Sony Bravia 8 II OLED TV review: a TV enthusiast’s dream

News RoomJanuary 15, 2026

I’ve tested 30 smart locks, and these are the best

News RoomJanuary 14, 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Demo
Most Popular

Pixel Airdropping to iPhones, Macs, and iPads works great

November 21, 2025

Operation Bluebird wants to reclaim Twitter’s ‘abandoned’ trademarks for a new social network

December 10, 2025

Meta had a 17-strike policy for sex trafficking, former safety leader claims

November 24, 2025
Our Picks

Netflix won’t slash cinema dibs on Warner Movies cinema to 17 days, commits to 45-day window

January 16, 2026

Ads are coming soon to ChatGPT, starting with shopping links

January 16, 2026

OLED MacBook Pro tipped for earlier arrival and it’s all thanks to Samsung

January 16, 2026

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Privacy Policy
  • Terms of use
  • For Advertisers
  • Contact
2026 © Prices.com LLC. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.