Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

BlueBorne threatens almost every connected device with Bluetooth-based attacks


Researchers have discovered a new attack vector they've named "BlueBorne" that enables bad actors to compromise nearly every connected device via Bluetooth.

Discovered by Armis Labs, this new threat applies to mobile phones, computers, and IoT devices. To leverage it, an attacker begins by scanning for active Bluetooth connections within 32 feet. They then choose a device (even if it's not in "discoverable" mode) and obtain its MAC address, an identifier which they can use to probe the device and determine its operating system. With that knowledge, the bad actor can craft an exploit for one of eight zero-day vulnerabilities affecting the implementation of the Bluetooth protocol to take full control of the device... all within a mere 10 seconds!

Here's a demonstration video of how someone could leverage Blueborne to compromise an Android phone. Once a nefarious individual has successfully taken over a device using BlueBorne, they can do lots of things. They could choose to...(continued)

View All Trending Stories