Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

Billions Of Bluetooh Devices Vulnerable To Man-In-The-Middle Takeover Attacks

BlueBorne vulnerabilities impact at least 5.3 billion Bluetooth-enabled devices, including computers, smartphones, and IoT devices such as watches, smart TVs, and some automobile systems.

Billions of Bluetooth devices, including those running on Android, iOS, Linux, and Windows, contain major vulnerabilities that can allow malicious actors to remotely execute code, take over devices, and perform man-in-the-middle (MITM) attacks, researchers have reported.

What's more, attackers do not need to trick users into performing an action in order to compromise or infect them, nor does a target device's Bluetooth have to paired with an attacking device or even be in Discovery Mode. The device simply has to have its Bluetooth feature turned on, which for most products is the default setting.

Even worse, compromised devices can then be further leveraged to attack additional nearby systems over the air, including any segregated or air-gapped devices that happen to beBluetooth-enabled....(continued)

View All Trending Stories