7 years, 7 months ago
New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device
The hackers using BlueBorne Attack Vector can leverage Bluetooth connectivity by masquerading as a bluetooth device and then take over control. IoT security platform Armis on 12 September gave warnings about a new attack vector targeting Android, iOS, Windows and Linux systems using the Bluetooth function. The name of this IoT Attack Vector is ‘ BlueBorne ’ and it allows the attacker to take control of the affected devices, spread malware to adjacent devices and penetrate secure air-gapped systems. The hackers using BlueBorne Attack Vector can leverage Bluetooth connectivity by masquerading as a Bluetooth device and then take over control of the targeted system.
Discover Related

1 year, 4 months ago
Are Bluetooth connections secure?

2 years, 4 months ago
What is Bluebugging and how do hackers use it? Learn how to secure your devices

2 years, 4 months ago
What is bluebugging, and how is it used to hack Bluetooth-enabled devices?

5 years, 5 months ago
Bluetooth might be helping hackers to get into your phone

5 years, 8 months ago
New flaw lets hackers snoop on you using Bluetooth

11 years, 9 months ago
4-year-old Android loophole could allow malware on 99 percent of all devices

17 years, 6 months ago