2024 Author: Malcolm Clapton | [email protected]. Last modified: 2023-12-17 03:44
Yesterday, experts at the computer firm Armis discovered a dangerous vulnerability in the Bluetooth protocol. It allows attackers to stealthily gain complete control over virtually any device using this wireless interface.
To be more precise, the experts found several problems at once in the implementation of the Bluetooth protocol for various platforms (Windows, Linux, Android, iOS). They were all merged under the common name BlueBorne.
Since Bluetooth is the most common way of exchanging data between closely located devices, a variety of technology can be at risk - from ordinary computers and mobiles to various gadgets from the Internet of Things category.
A BlueBorne attack requires no user interaction, which makes it even more dangerous. Bluetooth-enabled devices are constantly looking for a connection with other gadgets, so it is theoretically possible to create a self-replicating Bluetooth worm that will provoke a global epidemic.
Here's a demo of hacking an Android smartphone. The attacker secretly connects to the device via Bluetooth and takes a photo of the victim.
How to avoid danger?
Armis has already announced BlueBorne to all leading software vendors, including Apple, Google, Microsoft, and the Linux community. The development of special patches that eliminate the vulnerability began immediately. However, it may take several days or even weeks before they are published.
Therefore, computer security experts recommend turning off Bluetooth on your device before the patches appear. Or, if for some reason it is impossible for you, use the connection using this protocol as little as possible. And be sure to install any security updates coming soon.
Android users can also check their devices using a dedicated utility. It was released by Armis, which discovered BlueBorne. With its help, you can analyze the security of not only your gadget, but also all others that will be within the reach of a Bluetooth connection.
Recommended:
How to do a block deadlift to build your back and avoid damaging your shoulders
The life hacker understands what is the use of the thrust of the upper block and whether it can do any harm. Also, you will find the correct technique and various variations of the exercise
Why gout can ruin your life and how to avoid it
This pain appears suddenly and disappears just as quickly. But if you ignore it, gout will destroy your joints
Smart bone allows you to play with your dog via your smartphone
Wickedbone resembles a bone. The device can move using gyroscopes and rotating wheels. It moves quickly, teases the dog and awakens its hunting instincts
A stolen smartphone can be used to steal your money. Here's how to protect them
Losing your smartphone can easily result in the loss of funds from your accounts. We tell you how to protect your smartphone, and with it your money
11 signs your computer or smartphone has been hacked
Hacking your computer or phone can go unnoticed. We will show you how to recognize something wrong, and most importantly, how to prevent it