Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • Charlie Kirk shot dead
  • Nepal protests
  • Russia-Poland tension
  • Israeli strikes in Qatar
  • Larry Ellison
  • Apple event
  • Sunjay Kapur inheritance row
fp-logo
New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit

New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device

tech2 News Staff • September 13, 2017, 19:27:45 IST
Whatsapp Facebook Twitter

The hackers using BlueBorne Attack Vector can leverage Bluetooth connectivity by masquerading as a bluetooth device and then take over control.

Advertisement
Subscribe Join Us
Choose
Firstpost on Google
Choose
Firstpost on Google
New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device

IoT security platform Armis on 12 September gave warnings about a new attack vector targeting Android, iOS, Windows and Linux systems using the Bluetooth function. The name of this IoT Attack Vector is ‘ BlueBorne’ and it allows the attacker to take control of the affected devices, spread malware to adjacent devices and penetrate secure air-gapped systems. Armis has also released eight related “zero-day vulnerabilities” out of which four are classified as critical. [caption id=“attachment_4040185” align=“alignleft” width=“380”]Image Courtesy: Armis Image Courtesy: Armis[/caption] The hackers using BlueBorne Attack Vector can leverage Bluetooth connectivity by masquerading as a Bluetooth device and then take over control of the targeted system. The startling part is that the device is not required to be paired via Bluetooth to the attackers device or even be set in discoverable mode. The nine vulnerabilities discovered by Armis are currently functional and can be fully exploited. However,  iPhones running iOS 10 are not in danger from this attack vector. In a video shown below, Armis was able to successfully demonstrate an attack over an unpatched Google Pixel device and run software without user permission.

Although the underlying vulnerability lies in some form or the other across various Android devices the specifically targeted exploit varies across different systems according to Arstechnica.  Also, there is the fact that the necessity of  Bluetooth actually impedes the range from which a hacker can take control of your device and the Bluetooth function must also be on at the time. There are various known Bluetooth vulnerabilities as given in a guide by NIST and chances are that if you are behind on the latest security patches for your phone chances are that you could be exposed to this vulnerability real quick.

Tags
Bluetooth Hacker NIST IoT Google Pixel zero day vulnerabilities
  • Home
  • Tech
  • News & Analysis
  • New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device
End of Article
Latest News
Find us on YouTube
Subscribe
  • Home
  • Tech
  • News & Analysis
  • New IoT attack vector BlueBorne exposes Bluetooth vulnerabilities to take control of your device
End of Article

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Enjoying the news?

Get the latest stories delivered straight to your inbox.

Subscribe
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV